Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 7 Mar 2014 15:35:55 +0000 (UTC)
From:      Eitan Adler <eadler@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r262890 - in head/lib/libc: stdio string
Message-ID:  <201403071535.s27FZtFZ008432@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: eadler
Date: Fri Mar  7 15:35:54 2014
New Revision: 262890
URL: http://svnweb.freebsd.org/changeset/base/262890

Log:
  libc man pages: Remove reference to non-existent FreeBSD Security
  Architecture
  
  MFC After:	3 days

Modified:
  head/lib/libc/stdio/tmpnam.3
  head/lib/libc/string/strcat.3
  head/lib/libc/string/strcpy.3

Modified: head/lib/libc/stdio/tmpnam.3
==============================================================================
--- head/lib/libc/stdio/tmpnam.3	Fri Mar  7 14:44:13 2014	(r262889)
+++ head/lib/libc/stdio/tmpnam.3	Fri Mar  7 15:35:54 2014	(r262890)
@@ -244,5 +244,3 @@ file permissions may be specified.
 It is strongly suggested that
 .Xr mkstemp 3
 be used in place of these functions.
-(See
-the FSA.)

Modified: head/lib/libc/string/strcat.3
==============================================================================
--- head/lib/libc/string/strcat.3	Fri Mar  7 14:44:13 2014	(r262889)
+++ head/lib/libc/string/strcat.3	Fri Mar  7 15:35:54 2014	(r262890)
@@ -103,8 +103,6 @@ The
 function is easily misused in a manner
 which enables malicious users to arbitrarily change
 a running program's functionality through a buffer overflow attack.
-(See
-the FSA.)
 .Pp
 Avoid using
 .Fn strcat .

Modified: head/lib/libc/string/strcpy.3
==============================================================================
--- head/lib/libc/string/strcpy.3	Fri Mar  7 14:44:13 2014	(r262889)
+++ head/lib/libc/string/strcpy.3	Fri Mar  7 15:35:54 2014	(r262890)
@@ -210,7 +210,3 @@ The
 function is easily misused in a manner which enables malicious users
 to arbitrarily change a running program's functionality through a
 buffer overflow attack.
-(See
-the FSA
-and
-.Sx EXAMPLES . )



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403071535.s27FZtFZ008432>