Re: Directory/File Access Permissions for COPY and Generic File Access Functions
От | Alvaro Herrera |
---|---|
Тема | Re: Directory/File Access Permissions for COPY and Generic File Access Functions |
Дата | |
Msg-id | 20141029152618.GG1791@alvin.alvh.no-ip.org обсуждение исходный текст |
Ответ на | Re: Directory/File Access Permissions for COPY and Generic File Access Functions (Robert Haas <robertmhaas@gmail.com>) |
Ответы |
Re: Directory/File Access Permissions for COPY and Generic
File Access Functions
|
Список | pgsql-hackers |
Robert Haas wrote: > On Wed, Oct 29, 2014 at 10:52 AM, Andres Freund <andres@2ndquadrant.com> wrote: > >> The larger point though is that this is just one of innumerable attack > >> routes for anyone with the ability to make the server do filesystem reads > >> or writes of his choosing. If you think that's something you can safely > >> give to people you don't trust enough to make them superusers, you are > >> wrong, and I don't particularly want to spend the next ten years trying > >> to wrap band-aids around your misjudgment. > > > > ... but that doesn't necessarily address this point. > > I think the question is "just how innumerable are those attack > routes"? So, we can prevent a symlink from being used via O_NOFOLLOW. > But what about hard links? Users cannot create a hard link to a file they can't already access. -- Álvaro Herrera http://www.2ndQuadrant.com/ PostgreSQL Development, 24x7 Support, Training & Services
В списке pgsql-hackers по дате отправления: