aboutsummaryrefslogtreecommitdiff
path: root/src/backend/utils/init/postinit.c
diff options
context:
space:
mode:
authorTom Lane <tgl@sss.pgh.pa.us>2024-11-11 17:05:53 -0500
committerTom Lane <tgl@sss.pgh.pa.us>2024-11-11 17:05:53 -0500
commitf4f5d27d87247da1ec7e5a6e7990a22ffba9f63a (patch)
tree8bbb368305a5e34bbea7892fe887dd50291aa77d /src/backend/utils/init/postinit.c
parent8d19f3fea003b1f744516b84cbdb0097ae7b2912 (diff)
downloadpostgresql-f4f5d27d87247da1ec7e5a6e7990a22ffba9f63a.tar.gz
postgresql-f4f5d27d87247da1ec7e5a6e7990a22ffba9f63a.zip
Parallel workers use AuthenticatedUserId for connection privilege checks.
Commit 5a2fed911 had an unexpected side-effect: the parallel worker launched for the new test case would fail if it couldn't use a superuser-reserved connection slot. The reason that test failed while all our pre-existing ones worked is that the connection privilege tests in InitPostgres had been based on the superuserness of the leader's AuthenticatedUserId, but after the rearrangements of 5a2fed911 we were testing the superuserness of CurrentUserId, which the new test case deliberately made to be a non-superuser. This all seems very accidental and probably not the behavior we really want, but a security patch is no time to be redesigning things. Pending some discussion about desirable semantics, hack it so that InitPostgres continues to pay attention to the superuserness of AuthenticatedUserId when starting a parallel worker. Nathan Bossart and Tom Lane, per buildfarm member sawshark. Security: CVE-2024-10978
Diffstat (limited to 'src/backend/utils/init/postinit.c')
-rw-r--r--src/backend/utils/init/postinit.c19
1 files changed, 18 insertions, 1 deletions
diff --git a/src/backend/utils/init/postinit.c b/src/backend/utils/init/postinit.c
index 0805398e24d..adc21e019d5 100644
--- a/src/backend/utils/init/postinit.c
+++ b/src/backend/utils/init/postinit.c
@@ -22,6 +22,7 @@
#include "access/genam.h"
#include "access/heapam.h"
#include "access/htup_details.h"
+#include "access/parallel.h"
#include "access/session.h"
#include "access/tableam.h"
#include "access/xact.h"
@@ -914,7 +915,23 @@ InitPostgres(const char *in_dbname, Oid dboid,
{
InitializeSessionUserId(username, useroid,
(flags & INIT_PG_OVERRIDE_ROLE_LOGIN) != 0);
- am_superuser = superuser();
+
+ /*
+ * In a parallel worker, set am_superuser based on the
+ * authenticated user ID, not the current role. This is pretty
+ * dubious but it matches our historical behavior. Note that this
+ * value of am_superuser is used only for connection-privilege
+ * checks here and in CheckMyDatabase (we won't reach
+ * process_startup_options in a background worker).
+ *
+ * In other cases, there's been no opportunity for the current
+ * role to diverge from the authenticated user ID yet, so we can
+ * just rely on superuser() and avoid an extra catalog lookup.
+ */
+ if (InitializingParallelWorker)
+ am_superuser = superuser_arg(GetAuthenticatedUserId());
+ else
+ am_superuser = superuser();
}
}
else