|
1 |
| -<!-- $PostgreSQL: pgsql/doc/src/sgml/release.sgml,v 1.501 2007/04/20 02:37:37 tgl Exp $ --> |
| 1 | +<!-- $PostgreSQL: pgsql/doc/src/sgml/release.sgml,v 1.502 2007/04/20 03:27:23 tgl Exp $ --> |
2 | 2 | <!--
|
3 | 3 |
|
4 | 4 | Typical markup:
|
@@ -73,8 +73,7 @@ do it for earlier branch release files.
|
73 | 73 | truly secure value of <varname>search_path</>. Without it,
|
74 | 74 | an unprivileged SQL user can use temporary objects to execute code
|
75 | 75 | with the privileges of the security-definer function (CVE-2007-2138).
|
76 |
| - See <xref linkend="sql-createfunction" |
77 |
| - endterm="sql-createfunction-title"> for more information. |
| 76 | + See <command>CREATE FUNCTION</> for more information. |
78 | 77 | </para>
|
79 | 78 | </listitem>
|
80 | 79 |
|
@@ -3106,8 +3105,7 @@ do it for earlier branch release files.
|
3106 | 3105 | truly secure value of <varname>search_path</>. Without it,
|
3107 | 3106 | an unprivileged SQL user can use temporary objects to execute code
|
3108 | 3107 | with the privileges of the security-definer function (CVE-2007-2138).
|
3109 |
| - See <xref linkend="sql-createfunction" |
3110 |
| - endterm="sql-createfunction-title"> for more information. |
| 3108 | + See <command>CREATE FUNCTION</> for more information. |
3111 | 3109 | </para>
|
3112 | 3110 | </listitem>
|
3113 | 3111 |
|
@@ -6146,8 +6144,7 @@ psql -t -f fixseq.sql db1 | psql -e db1
|
6146 | 6144 | truly secure value of <varname>search_path</>. Without it,
|
6147 | 6145 | an unprivileged SQL user can use temporary objects to execute code
|
6148 | 6146 | with the privileges of the security-definer function (CVE-2007-2138).
|
6149 |
| - See <xref linkend="sql-createfunction" |
6150 |
| - endterm="sql-createfunction-title"> for more information. |
| 6147 | + See <command>CREATE FUNCTION</> for more information. |
6151 | 6148 | </para>
|
6152 | 6149 | </listitem>
|
6153 | 6150 |
|
@@ -9656,8 +9653,7 @@ typedefs (Michael)</para></listitem>
|
9656 | 9653 | truly secure value of <varname>search_path</>. Without it,
|
9657 | 9654 | an unprivileged SQL user can use temporary objects to execute code
|
9658 | 9655 | with the privileges of the security-definer function (CVE-2007-2138).
|
9659 |
| - See <xref linkend="sql-createfunction" |
9660 |
| - endterm="sql-createfunction-title"> for more information. |
| 9656 | + See <command>CREATE FUNCTION</> for more information. |
9661 | 9657 | </para>
|
9662 | 9658 | </listitem>
|
9663 | 9659 |
|
@@ -12843,8 +12839,7 @@ DROP SCHEMA information_schema CASCADE;
|
12843 | 12839 | truly secure value of <varname>search_path</>. Without it,
|
12844 | 12840 | an unprivileged SQL user can use temporary objects to execute code
|
12845 | 12841 | with the privileges of the security-definer function (CVE-2007-2138).
|
12846 |
| - See <xref linkend="sql-createfunction" |
12847 |
| - endterm="sql-createfunction-title"> for more information. |
| 12842 | + See <command>CREATE FUNCTION</> for more information. |
12848 | 12843 | </para>
|
12849 | 12844 | </listitem>
|
12850 | 12845 |
|
|
0 commit comments