Skip to content

Commit a174b6f

Browse files
committed
Fix markup.
Security: CVE-2007-2138
1 parent a796aac commit a174b6f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

doc/src/sgml/ref/create_function.sgml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
<!--
2-
$Header: /cvsroot/pgsql/doc/src/sgml/ref/create_function.sgml,v 1.43.2.1 2007/04/20 02:38:57 tgl Exp $
2+
$Header: /cvsroot/pgsql/doc/src/sgml/ref/create_function.sgml,v 1.43.2.2 2007/04/20 03:10:57 tgl Exp $
33
-->
44

55
<refentry id="SQL-CREATEFUNCTION">
@@ -455,7 +455,7 @@ Point * complex_to_point (Complex *z)
455455
Because a <literal>SECURITY DEFINER</literal> function is executed
456456
with the privileges of the user that created it, care is needed to
457457
ensure that the function cannot be misused. For security,
458-
<xref linkend="guc-search-path"> should be set to exclude any schemas
458+
<varname>search_path</> should be set to exclude any schemas
459459
writable by untrusted users. This prevents
460460
malicious users from creating objects that mask objects used by the
461461
function. Particularly important is in this regard is the

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy