|
1 | 1 | <!--
|
2 |
| -$Header: /cvsroot/pgsql/doc/src/sgml/ref/create_function.sgml,v 1.43.2.1 2007/04/2002:38:57 tgl Exp $ |
| 2 | +$Header: /cvsroot/pgsql/doc/src/sgml/ref/create_function.sgml,v 1.43.2.2 2007/04/2003:10:57 tgl Exp $ |
3 | 3 | -->
|
4 | 4 |
|
5 | 5 | <refentry id="SQL-CREATEFUNCTION">
|
@@ -455,7 +455,7 @@ Point * complex_to_point (Complex *z)
|
455 | 455 | Because a <literal>SECURITY DEFINER</literal> function is executed
|
456 | 456 | with the privileges of the user that created it, care is needed to
|
457 | 457 | ensure that the function cannot be misused. For security,
|
458 |
| - <xref linkend="guc-search-path"> should be set to exclude any schemas |
| 458 | + <varname>search_path</> should be set to exclude any schemas |
459 | 459 | writable by untrusted users. This prevents
|
460 | 460 | malicious users from creating objects that mask objects used by the
|
461 | 461 | function. Particularly important is in this regard is the
|
|