Commit 23c8b0cc authored by Tom Lane's avatar Tom Lane

Fix markup.

Security: CVE-2007-2138
parent aa27977f
<!-- $PostgreSQL: pgsql/doc/src/sgml/release.sgml,v 1.501 2007/04/20 02:37:37 tgl Exp $ --> <!-- $PostgreSQL: pgsql/doc/src/sgml/release.sgml,v 1.502 2007/04/20 03:27:23 tgl Exp $ -->
<!-- <!--
Typical markup: Typical markup:
...@@ -73,8 +73,7 @@ do it for earlier branch release files. ...@@ -73,8 +73,7 @@ do it for earlier branch release files.
truly secure value of <varname>search_path</>. Without it, truly secure value of <varname>search_path</>. Without it,
an unprivileged SQL user can use temporary objects to execute code an unprivileged SQL user can use temporary objects to execute code
with the privileges of the security-definer function (CVE-2007-2138). with the privileges of the security-definer function (CVE-2007-2138).
See <xref linkend="sql-createfunction" See <command>CREATE FUNCTION</> for more information.
endterm="sql-createfunction-title"> for more information.
</para> </para>
</listitem> </listitem>
...@@ -3106,8 +3105,7 @@ do it for earlier branch release files. ...@@ -3106,8 +3105,7 @@ do it for earlier branch release files.
truly secure value of <varname>search_path</>. Without it, truly secure value of <varname>search_path</>. Without it,
an unprivileged SQL user can use temporary objects to execute code an unprivileged SQL user can use temporary objects to execute code
with the privileges of the security-definer function (CVE-2007-2138). with the privileges of the security-definer function (CVE-2007-2138).
See <xref linkend="sql-createfunction" See <command>CREATE FUNCTION</> for more information.
endterm="sql-createfunction-title"> for more information.
</para> </para>
</listitem> </listitem>
...@@ -6146,8 +6144,7 @@ psql -t -f fixseq.sql db1 | psql -e db1 ...@@ -6146,8 +6144,7 @@ psql -t -f fixseq.sql db1 | psql -e db1
truly secure value of <varname>search_path</>. Without it, truly secure value of <varname>search_path</>. Without it,
an unprivileged SQL user can use temporary objects to execute code an unprivileged SQL user can use temporary objects to execute code
with the privileges of the security-definer function (CVE-2007-2138). with the privileges of the security-definer function (CVE-2007-2138).
See <xref linkend="sql-createfunction" See <command>CREATE FUNCTION</> for more information.
endterm="sql-createfunction-title"> for more information.
</para> </para>
</listitem> </listitem>
...@@ -9656,8 +9653,7 @@ typedefs (Michael)</para></listitem> ...@@ -9656,8 +9653,7 @@ typedefs (Michael)</para></listitem>
truly secure value of <varname>search_path</>. Without it, truly secure value of <varname>search_path</>. Without it,
an unprivileged SQL user can use temporary objects to execute code an unprivileged SQL user can use temporary objects to execute code
with the privileges of the security-definer function (CVE-2007-2138). with the privileges of the security-definer function (CVE-2007-2138).
See <xref linkend="sql-createfunction" See <command>CREATE FUNCTION</> for more information.
endterm="sql-createfunction-title"> for more information.
</para> </para>
</listitem> </listitem>
...@@ -12843,8 +12839,7 @@ DROP SCHEMA information_schema CASCADE; ...@@ -12843,8 +12839,7 @@ DROP SCHEMA information_schema CASCADE;
truly secure value of <varname>search_path</>. Without it, truly secure value of <varname>search_path</>. Without it,
an unprivileged SQL user can use temporary objects to execute code an unprivileged SQL user can use temporary objects to execute code
with the privileges of the security-definer function (CVE-2007-2138). with the privileges of the security-definer function (CVE-2007-2138).
See <xref linkend="sql-createfunction" See <command>CREATE FUNCTION</> for more information.
endterm="sql-createfunction-title"> for more information.
</para> </para>
</listitem> </listitem>
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment