- Notifications
You must be signed in to change notification settings - Fork5
Commitc58675b
committed
Prevent pg_ctl from being run as root. Since it uses configuration files
owned by postgres, doing "pg_ctl start" as root could allow a privilegeescalation attack, as pointed out by iDEFENSE. Of course the postmaster wouldfail, but we ought to fail a little sooner to protect sysadmins unfamiliarwith Postgres. The chosen fix is to disable root use of pg_ctl in all cases,just to be confident there are no other holes.1 parent9eff02f commitc58675b
1 file changed
+20
-2
lines changedLines changed: 20 additions & 2 deletions
Original file line number | Diff line number | Diff line change | |
---|---|---|---|
| |||
4 | 4 |
| |
5 | 5 |
| |
6 | 6 |
| |
7 |
| - | |
| 7 | + | |
8 | 8 |
| |
9 | 9 |
| |
10 | 10 |
| |
| |||
14 | 14 |
| |
15 | 15 |
| |
16 | 16 |
| |
17 |
| - | |
18 | 17 |
| |
19 | 18 |
| |
| 19 | + | |
20 | 20 |
| |
21 | 21 |
| |
22 | 22 |
| |
| |||
1229 | 1229 |
| |
1230 | 1230 |
| |
1231 | 1231 |
| |
| 1232 | + | |
1232 | 1233 |
| |
1233 | 1234 |
| |
1234 | 1235 |
| |
| |||
1244 | 1245 |
| |
1245 | 1246 |
| |
1246 | 1247 |
| |
| 1248 | + | |
| 1249 | + | |
| 1250 | + | |
| 1251 | + | |
| 1252 | + | |
| 1253 | + | |
| 1254 | + | |
| 1255 | + | |
| 1256 | + | |
| 1257 | + | |
| 1258 | + | |
| 1259 | + | |
| 1260 | + | |
| 1261 | + | |
| 1262 | + | |
| 1263 | + | |
| 1264 | + | |
1247 | 1265 |
| |
1248 | 1266 |
| |
1249 | 1267 |
| |
|
0 commit comments
Comments
(0)