Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commita174b6f

Browse files
committed
Fix markup.
Security:CVE-2007-2138
1 parenta796aac commita174b6f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

‎doc/src/sgml/ref/create_function.sgml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
<!--
2-
$Header: /cvsroot/pgsql/doc/src/sgml/ref/create_function.sgml,v 1.43.2.1 2007/04/2002:38:57 tgl Exp $
2+
$Header: /cvsroot/pgsql/doc/src/sgml/ref/create_function.sgml,v 1.43.2.2 2007/04/2003:10:57 tgl Exp $
33
-->
44

55
<refentry id="SQL-CREATEFUNCTION">
@@ -455,7 +455,7 @@ Point * complex_to_point (Complex *z)
455455
Because a <literal>SECURITY DEFINER</literal> function is executed
456456
with the privileges of the user that created it, care is needed to
457457
ensure that the function cannot be misused. For security,
458-
<xref linkend="guc-search-path"> should be set to exclude any schemas
458+
<varname>search_path</> should be set to exclude any schemas
459459
writable by untrusted users. This prevents
460460
malicious users from creating objects that mask objects used by the
461461
function. Particularly important is in this regard is the

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp