Re: Including PL/PgSQL by default - Mailing list pgsql-hackers

From Tom Lane
Subject Re: Including PL/PgSQL by default
Date
Msg-id 3057.1203572403@sss.pgh.pa.us
Whole thread Raw
In response to Re: Including PL/PgSQL by default  ("Greg Sabino Mullane" <greg@turnstep.com>)
Responses Re: Including PL/PgSQL by default  ("Greg Sabino Mullane" <greg@turnstep.com>)
List pgsql-hackers
"Greg Sabino Mullane" <greg@turnstep.com> writes:
> I'm not sure I understand the security implications of turning plpgsql on:
> has there been some security concerns in the past? Does having access
> to plpgsql really faciliate an attacker that much above what they might
> already be capable of without it? It seems quite trivial to write a
> function in sql that ties up resources just as effectively as plpgsql.

I grow weary of repeating this: it's not about resource consumption, nor
about potential security holes in plpgsql itself.  It's about handing
attackers the capability to further exploit *other* security holes.
        regards, tom lane


pgsql-hackers by date:

Previous
From: ITAGAKI Takahiro
Date:
Subject: Re: ANALYZE to be ignored by VACUUM
Next
From: Tom Lane
Date:
Subject: VARATT_EXTERNAL_GET_POINTER is not quite there yet