*** This bug is a security vulnerability ***

You have been subscribed to a public security bug by Marc Deslauriers 
(mdeslaur):

awe_read_option_file in awelib/optfile.c has an strcpy to `char
tmp[256]`; input from the command line can be used to overflow this
buffer.

** Affects: awesfx (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: security
-- 
buffer overflow in awesfx
https://bugs.launchpad.net/bugs/744794
You received this bug notification because you are a member of Ubuntu Bugs, 
which is subscribed to the bug report.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to