Re: Securing "make check" (CVE-2014-0067) - Mailing list pgsql-hackers

From Tom Lane
Subject Re: Securing "make check" (CVE-2014-0067)
Date
Msg-id 15470.1393828140@sss.pgh.pa.us
Whole thread Raw
In response to Re: Securing "make check" (CVE-2014-0067)  (Noah Misch <noah@leadboat.com>)
Responses Re: Securing "make check" (CVE-2014-0067)  (Stephen Frost <sfrost@snowman.net>)
Re: Securing "make check" (CVE-2014-0067)  (Noah Misch <noah@leadboat.com>)
List pgsql-hackers
Noah Misch <noah@leadboat.com> writes:
> Concerning the immediate fix for non-Windows systems, does any modern system
> ignore modes of Unix domain sockets?  It appears to be a long-fixed problem:

What I was envisioning was that we'd be relying on the permissions of the
containing directory to keep out bad guys.  Permissions on the socket
itself might be sufficient, but what does it save us to assume that?
        regards, tom lane



pgsql-hackers by date:

Previous
From: Pavel Stehule
Date:
Subject: Re: proposal, patch: allow multiple plpgsql plugins
Next
From: Ronan Dunklau
Date:
Subject: Re: Triggers on foreign tables