- Notifications
You must be signed in to change notification settings - Fork4.9k
Commit6acddf5
committed
Prevent pg_ctl from being run as root. Since it uses configuration files
owned by postgres, doing "pg_ctl start" as root could allow a privilegeescalation attack, as pointed out by iDEFENSE. Of course the postmaster wouldfail, but we ought to fail a little sooner to protect sysadmins unfamiliarwith Postgres. The chosen fix is to disable root use of pg_ctl in all cases,just to be confident there are no other holes.1 parent02571d4 commit6acddf5
1 file changed
+9
-1
lines changedLines changed: 9 additions & 1 deletion
Original file line number | Diff line number | Diff line change | |
---|---|---|---|
| |||
8 | 8 |
| |
9 | 9 |
| |
10 | 10 |
| |
11 |
| - | |
| 11 | + | |
12 | 12 |
| |
13 | 13 |
| |
14 | 14 |
| |
| |||
109 | 109 |
| |
110 | 110 |
| |
111 | 111 |
| |
| 112 | + | |
| 113 | + | |
| 114 | + | |
| 115 | + | |
| 116 | + | |
| 117 | + | |
| 118 | + | |
| 119 | + | |
112 | 120 |
| |
113 | 121 |
| |
114 | 122 |
| |
|
0 commit comments
Comments
(0)