postgresql/contrib/adminpack
Stephen Frost 53b79ab4fe adminpack: Revoke EXECUTE on pg_logfile_rotate()
In 9.6, we moved a number of functions over to using the GRANT system to
control access instead of having hard-coded superuser checks.

As it turns out, adminpack was creating another function in the catalog
for one of those backend functions where the superuser check was
removed, specifically pg_rotate_logfile(), but it didn't get the memo
about having to REVOKE EXECUTE on the alternative-name function
(pg_logfile_rotate()), meaning that in any installations with adminpack
on 9.6 and higher, any user is able to run the pg_logfile_rotate()
function, which then calls pg_rotate_logfile() and rotates the logfile.

Fix by adding a new version of adminpack (1.1) which handles the REVOKE.
As this function should have only been available to the superuser, this
is a security issue, albeit a minor one.

Security: CVE-2018-1115
2018-05-07 10:10:45 -04:00
..
adminpack--1.0--1.1.sql adminpack: Revoke EXECUTE on pg_logfile_rotate() 2018-05-07 10:10:45 -04:00
adminpack--1.0.sql Throw a useful error message if an extension script file is fed to psql. 2011-10-12 15:45:03 -04:00
adminpack--1.1.sql adminpack: Revoke EXECUTE on pg_logfile_rotate() 2018-05-07 10:10:45 -04:00
adminpack.c Fix potentially-unportable code in contrib/adminpack. 2018-04-15 13:02:11 -04:00
adminpack.control adminpack: Revoke EXECUTE on pg_logfile_rotate() 2018-05-07 10:10:45 -04:00
Makefile adminpack: Revoke EXECUTE on pg_logfile_rotate() 2018-05-07 10:10:45 -04:00