Date: Mon, 10 Mar 2014 00:53:37 +0000 (UTC) From: Eitan Adler <eadler@FreeBSD.org> To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-stable@freebsd.org, svn-src-stable-10@freebsd.org Subject: svn commit: r262965 - in stable/10/lib/libc: stdio string Message-ID: <201403100053.s2A0rb4M050910@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: eadler Date: Mon Mar 10 00:53:37 2014 New Revision: 262965 URL: http://svnweb.freebsd.org/changeset/base/262965 Log: MFC r262890: libc man pages: Remove reference to non-existent FreeBSD Security Architecture Modified: stable/10/lib/libc/stdio/tmpnam.3 stable/10/lib/libc/string/strcat.3 stable/10/lib/libc/string/strcpy.3 Directory Properties: stable/10/ (props changed) Modified: stable/10/lib/libc/stdio/tmpnam.3 ============================================================================== --- stable/10/lib/libc/stdio/tmpnam.3 Sun Mar 9 23:47:34 2014 (r262964) +++ stable/10/lib/libc/stdio/tmpnam.3 Mon Mar 10 00:53:37 2014 (r262965) @@ -244,5 +244,3 @@ file permissions may be specified. It is strongly suggested that .Xr mkstemp 3 be used in place of these functions. -(See -the FSA.) Modified: stable/10/lib/libc/string/strcat.3 ============================================================================== --- stable/10/lib/libc/string/strcat.3 Sun Mar 9 23:47:34 2014 (r262964) +++ stable/10/lib/libc/string/strcat.3 Mon Mar 10 00:53:37 2014 (r262965) @@ -103,8 +103,6 @@ The function is easily misused in a manner which enables malicious users to arbitrarily change a running program's functionality through a buffer overflow attack. -(See -the FSA.) .Pp Avoid using .Fn strcat . Modified: stable/10/lib/libc/string/strcpy.3 ============================================================================== --- stable/10/lib/libc/string/strcpy.3 Sun Mar 9 23:47:34 2014 (r262964) +++ stable/10/lib/libc/string/strcpy.3 Mon Mar 10 00:53:37 2014 (r262965) @@ -210,7 +210,3 @@ The function is easily misused in a manner which enables malicious users to arbitrarily change a running program's functionality through a buffer overflow attack. -(See -the FSA -and -.Sx EXAMPLES . )
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403100053.s2A0rb4M050910>