> Hey yep, good point. > > Is this the only way that we know of non postgresql-superusers to be > able to take out the server other than by extremely non-optimal, > resource wasting queries? > > If we release a 7.2.2 because of this, can we be pretty sure we have a > "no known vulnerabilities" release, or are there other small holes which > should be fixed too?
What about that "select cash_out(2) crashes because of opaque" entry in the TODO? That really needs to be fixed. I was talking to a CS lecturer about switching to postgres from oracle when 7.3 comes out and all he said was "how easily is it hacked?". He says their systems are the most constantly bombarded in universities. What could I say? That any unprivileged user can just go 'select cash_out(2)' to DOS the backend? Chris ---------------------------(end of broadcast)--------------------------- TIP 2: you can get off all lists at once with the unregister command (send "unregister YourEmailAddressHere" to [EMAIL PROTECTED])