Hi and thanks for the answer

2015-09-04 11:45 GMT+02:00 Albe Laurenz <laurenz.a...@wien.gv.at>:

> Etienne Champetier wrote:
> > We are planning to add a C extension (
> https://github.com/petropavel13/pg_rrule) to our shared
> > postgresql cluster, and wondering what are the risk? (looking for the
> worst case scenario here)
> >
> > If there is a SIGSEGV, SIGBUS, SIGABRT ..., is the whole server
> stopping, or just the request?
>
> All client connections will be terminated and the server will initiate
> recovery from the latest checkpoint.  Until that is done, no client
> can connect to the database.
>
> That is something you normally don't want to have in a production database.
>
ok, so hitting assert() is bad(tm) and i should really prevent all SIG*
from happening


>
> > Knowing that the extension is only used in select statement, is there a
> risk of (on disk) data
> > corruption?
>
> Even when run from a SELECT, a C function can do anything it wants with
> the server.
>
I'm thinking about "trusted" code with bugs in it, like out of bound write
or ...


>
> > Is the risk limited to the current database? (the extension will only be
> used by 1 application with 1
> > database, and we prefer not to impact other applications/databases)
>
> The C function can happily start removing arbitrary file owned by
> the PostgreSQL user if it chooses to, so no.
>
> > Are there any techniques to limit/mitigate these risks?
> (configuration/compile flags/...)
>
> You should only use C functions that you trust.
>
> Code review of the extension and good testing are your best protection.
>

I trust that the extension will not do harm on purpose, but it's C, and
there is almost always bug :)
pg_rrule use libical, which id 50k sloc, so code review is out, but i've
already tested all the data in the database,
and i'm playing with afl-fuzz (and already found a cool out of bound write)
Just wanted to know the worst case scenario


> Yours,
> Laurenz Albe
>

Thanks again
Etienne

Reply via email to