Re: Potential security risk associated with function call - Mailing list pgsql-hackers

From Jet
Subject Re: Potential security risk associated with function call
Date
Msg-id tencent_4C1BBF801C0B99C81131BAF6@qq.com
Whole thread Raw
In response to Re: Potential security risk associated with function call  ("Anders Åstrand" <anders@449.se>)
List pgsql-hackers
> My gut reaction would be to limit the creation of functions with
> language=internal to superusers, but that wouldn't work as it would
> break CREATE EXTENSION when there are server modules involved.
> 
> Maybe all C functions that are able to be used as language=internal
> needs to explicitly check nargs at the top of the function? 
Yes, all C functions suffer such potential risk, not only language=internal.
So limit the creation of functions with language=internal is not enough.

Jet
Halo Tech

pgsql-hackers by date:

Previous
From: Nazir Bilal Yavuz
Date:
Subject: Re: Speed up COPY FROM text/CSV parsing using SIMD
Next
From: Matthias van de Meent
Date:
Subject: Re: [WiP] B-tree page merge during vacuum to reduce index bloat