From: Bruce Momjian Date: Thu, 1 Sep 2022 01:10:37 +0000 (-0400) Subject: doc: warn of SECURITY DEFINER schemas for non-sql_body functions X-Git-Tag: REL_16_BETA1~1829 X-Git-Url: http://git.postgresql.org/gitweb/?a=commitdiff_plain;h=1703726488064901e05aeb24b463e1dc3d07bde9;p=postgresql.git doc: warn of SECURITY DEFINER schemas for non-sql_body functions Non-sql_body functions are evaluated at runtime. Reported-by: Erki Eessaar Discussion: https://postgr.es/m/AM9PR01MB8268BF5E74E119828251FD34FE409@AM9PR01MB8268.eurprd01.prod.exchangelabs.com Backpatch-through: 10 --- diff --git a/doc/src/sgml/ref/create_function.sgml b/doc/src/sgml/ref/create_function.sgml index 7e6d52c7dcf..35869bf6ba6 100644 --- a/doc/src/sgml/ref/create_function.sgml +++ b/doc/src/sgml/ref/create_function.sgml @@ -779,7 +779,10 @@ SELECT * FROM dup(42); Because a SECURITY DEFINER function is executed with the privileges of the user that owns it, care is needed to - ensure that the function cannot be misused. For security, + ensure that the function cannot be misused. This is particularly + important for non-sql_body functions because + their function bodies are evaluated at run-time, not creation time. + For security, should be set to exclude any schemas writable by untrusted users. This prevents malicious users from creating objects (e.g., tables, functions, and