Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 10 Mar 2014 00:53:37 +0000 (UTC)
From:      Eitan Adler <eadler@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-stable@freebsd.org, svn-src-stable-10@freebsd.org
Subject:   svn commit: r262965 - in stable/10/lib/libc: stdio string
Message-ID:  <201403100053.s2A0rb4M050910@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: eadler
Date: Mon Mar 10 00:53:37 2014
New Revision: 262965
URL: http://svnweb.freebsd.org/changeset/base/262965

Log:
  MFC r262890:
  libc man pages: Remove reference to non-existent FreeBSD Security
  	Architecture

Modified:
  stable/10/lib/libc/stdio/tmpnam.3
  stable/10/lib/libc/string/strcat.3
  stable/10/lib/libc/string/strcpy.3
Directory Properties:
  stable/10/   (props changed)

Modified: stable/10/lib/libc/stdio/tmpnam.3
==============================================================================
--- stable/10/lib/libc/stdio/tmpnam.3	Sun Mar  9 23:47:34 2014	(r262964)
+++ stable/10/lib/libc/stdio/tmpnam.3	Mon Mar 10 00:53:37 2014	(r262965)
@@ -244,5 +244,3 @@ file permissions may be specified.
 It is strongly suggested that
 .Xr mkstemp 3
 be used in place of these functions.
-(See
-the FSA.)

Modified: stable/10/lib/libc/string/strcat.3
==============================================================================
--- stable/10/lib/libc/string/strcat.3	Sun Mar  9 23:47:34 2014	(r262964)
+++ stable/10/lib/libc/string/strcat.3	Mon Mar 10 00:53:37 2014	(r262965)
@@ -103,8 +103,6 @@ The
 function is easily misused in a manner
 which enables malicious users to arbitrarily change
 a running program's functionality through a buffer overflow attack.
-(See
-the FSA.)
 .Pp
 Avoid using
 .Fn strcat .

Modified: stable/10/lib/libc/string/strcpy.3
==============================================================================
--- stable/10/lib/libc/string/strcpy.3	Sun Mar  9 23:47:34 2014	(r262964)
+++ stable/10/lib/libc/string/strcpy.3	Mon Mar 10 00:53:37 2014	(r262965)
@@ -210,7 +210,3 @@ The
 function is easily misused in a manner which enables malicious users
 to arbitrarily change a running program's functionality through a
 buffer overflow attack.
-(See
-the FSA
-and
-.Sx EXAMPLES . )



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403100053.s2A0rb4M050910>