aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--doc/src/sgml/release.sgml11
1 files changed, 4 insertions, 7 deletions
diff --git a/doc/src/sgml/release.sgml b/doc/src/sgml/release.sgml
index 18303fca6eb..d50a61677e0 100644
--- a/doc/src/sgml/release.sgml
+++ b/doc/src/sgml/release.sgml
@@ -1,5 +1,5 @@
<!--
-$PostgreSQL: pgsql/doc/src/sgml/release.sgml,v 1.321.4.35 2007/04/20 02:38:31 tgl Exp $
+$PostgreSQL: pgsql/doc/src/sgml/release.sgml,v 1.321.4.36 2007/04/20 03:27:54 tgl Exp $
-->
<appendix id="release">
@@ -45,8 +45,7 @@ $PostgreSQL: pgsql/doc/src/sgml/release.sgml,v 1.321.4.35 2007/04/20 02:38:31 tg
truly secure value of <varname>search_path</>. Without it,
an unprivileged SQL user can use temporary objects to execute code
with the privileges of the security-definer function (CVE-2007-2138).
- See <xref linkend="sql-createfunction"
- endterm="sql-createfunction-title"> for more information.
+ See <command>CREATE FUNCTION</> for more information.
</para>
</listitem>
@@ -3554,8 +3553,7 @@ typedefs (Michael)</para></listitem>
truly secure value of <varname>search_path</>. Without it,
an unprivileged SQL user can use temporary objects to execute code
with the privileges of the security-definer function (CVE-2007-2138).
- See <xref linkend="sql-createfunction"
- endterm="sql-createfunction-title"> for more information.
+ See <command>CREATE FUNCTION</> for more information.
</para>
</listitem>
@@ -6739,8 +6737,7 @@ DROP SCHEMA information_schema CASCADE;
truly secure value of <varname>search_path</>. Without it,
an unprivileged SQL user can use temporary objects to execute code
with the privileges of the security-definer function (CVE-2007-2138).
- See <xref linkend="sql-createfunction"
- endterm="sql-createfunction-title"> for more information.
+ See <command>CREATE FUNCTION</> for more information.
</para>
</listitem>