Module Name:    src
Committed By:   wiz
Date:           Sat May  2 09:31:08 UTC 2009

Modified Files:
        src/lib/libc/string: strcpy.3

Log Message:
Sort sections.


To generate a diff of this commit:
cvs rdiff -u -r1.18 -r1.19 src/lib/libc/string/strcpy.3

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/lib/libc/string/strcpy.3
diff -u src/lib/libc/string/strcpy.3:1.18 src/lib/libc/string/strcpy.3:1.19
--- src/lib/libc/string/strcpy.3:1.18	Fri May  1 17:27:01 2009
+++ src/lib/libc/string/strcpy.3	Sat May  2 09:31:08 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE.
 .\"
 .\"     from: @(#)strcpy.3	8.1 (Berkeley) 6/4/93
-.\"	$NetBSD: strcpy.3,v 1.18 2009/05/01 17:27:01 perry Exp $
+.\"	$NetBSD: strcpy.3,v 1.19 2009/05/02 09:31:08 wiz Exp $
 .\"
 .Dd May 1, 2009
 .Dt STRCPY 3
@@ -184,14 +184,6 @@
 .Xr strlcpy 3
 is not defined in any standards, it should
 only be used when portability is not a concern.
-.Sh SECURITY CONSIDERATIONS
-The
-.Fn strcpy
-and
-.Fn stpcpy
-functions are easily misused in a manner which enables malicious users
-to arbitrarily change a running program's functionality through a
-buffer overflow attack.
 .Sh SEE ALSO
 .Xr bcopy 3 ,
 .Xr memccpy 3 ,
@@ -220,3 +212,11 @@
 .Fn stpncpy
 functions first appeared in
 .Nx 6.0 .
+.Sh SECURITY CONSIDERATIONS
+The
+.Fn strcpy
+and
+.Fn stpcpy
+functions are easily misused in a manner which enables malicious users
+to arbitrarily change a running program's functionality through a
+buffer overflow attack.

Reply via email to