diff options
-rw-r--r-- | doc/src/sgml/release.sgml | 11 |
1 files changed, 4 insertions, 7 deletions
diff --git a/doc/src/sgml/release.sgml b/doc/src/sgml/release.sgml index 18303fca6eb..d50a61677e0 100644 --- a/doc/src/sgml/release.sgml +++ b/doc/src/sgml/release.sgml @@ -1,5 +1,5 @@ <!-- -$PostgreSQL: pgsql/doc/src/sgml/release.sgml,v 1.321.4.35 2007/04/20 02:38:31 tgl Exp $ +$PostgreSQL: pgsql/doc/src/sgml/release.sgml,v 1.321.4.36 2007/04/20 03:27:54 tgl Exp $ --> <appendix id="release"> @@ -45,8 +45,7 @@ $PostgreSQL: pgsql/doc/src/sgml/release.sgml,v 1.321.4.35 2007/04/20 02:38:31 tg truly secure value of <varname>search_path</>. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). - See <xref linkend="sql-createfunction" - endterm="sql-createfunction-title"> for more information. + See <command>CREATE FUNCTION</> for more information. </para> </listitem> @@ -3554,8 +3553,7 @@ typedefs (Michael)</para></listitem> truly secure value of <varname>search_path</>. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). - See <xref linkend="sql-createfunction" - endterm="sql-createfunction-title"> for more information. + See <command>CREATE FUNCTION</> for more information. </para> </listitem> @@ -6739,8 +6737,7 @@ DROP SCHEMA information_schema CASCADE; truly secure value of <varname>search_path</>. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). - See <xref linkend="sql-createfunction" - endterm="sql-createfunction-title"> for more information. + See <command>CREATE FUNCTION</> for more information. </para> </listitem> |