From: Tom Lane Date: Fri, 20 Apr 2007 03:27:43 +0000 (+0000) Subject: Fix markup. X-Git-Url: http://git.postgresql.org/gitweb/static/gitweb.js?a=commitdiff_plain;h=964398279188e4de38017dd952a1d44e40248e79;p=users%2Fbernd%2Fpostgres.git Fix markup. Security: CVE-2007-2138 --- diff --git a/doc/src/sgml/release.sgml b/doc/src/sgml/release.sgml index 97d446b28d..565f05d081 100644 --- a/doc/src/sgml/release.sgml +++ b/doc/src/sgml/release.sgml @@ -59,8 +59,7 @@ For new features, add links to the documentation sections. truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). - See for more information. + See CREATE FUNCTION for more information. @@ -3097,8 +3096,7 @@ psql -t -f fixseq.sql db1 | psql -e db1 truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). - See for more information. + See CREATE FUNCTION for more information. @@ -6606,8 +6604,7 @@ typedefs (Michael) truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). - See for more information. + See CREATE FUNCTION for more information. @@ -9791,8 +9788,7 @@ DROP SCHEMA information_schema CASCADE; truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). - See for more information. + See CREATE FUNCTION for more information.