Re: Potential security risk associated with function call - Mailing list pgsql-hackers

From Jet
Subject Re: Potential security risk associated with function call
Date
Msg-id tencent_67A43A0A37B0AB350E39C64A@qq.com
Whole thread Raw
In response to Re: Potential security risk associated with function call  (Matthias van de Meent <boekewurm+postgres@gmail.com>)
Responses Re: Potential security risk associated with function call
Re: Potential security risk associated with function call
List pgsql-hackers
> Correct. This is expected behaviour: the "internal" and "c" languages
> are not 'trusted' languages, and therefore only superusers can create
> functions using these languages. 
Yes, you're right, only superusers can create "in.ternal" and "c" languages

> It is the explicit responsibility of
> the superuser to make sure the functions they create using untrusted
> languages are correct and execute safely when called by PostgreSQL.
But the question is how can a superuser know the "internal" and "c" functions
implementation details? He will not know whether the code has !PG_ARGISNULL(...),
and create a harmful function accidentally...

Jet
Halo Tech

pgsql-hackers by date:

Previous
From: Kirill Reshke
Date:
Subject: Re: SQL:2011 Application Time Update & Delete
Next
From: Junwang Zhao
Date:
Subject: Re: Eliminating SPI / SQL from some RI triggers - take 3