*** This bug is a security vulnerability ***
You have been subscribed to a public security bug by Marc Deslauriers
(mdeslaur):
awe_read_option_file in awelib/optfile.c has an strcpy to `char
tmp[256]`; input from the command line can be used to overflow this
buffer.
** Affects: awesfx (Ubuntu)
Importance: Undecided
Status: New
** Tags: security
--
buffer overflow in awesfx
https://bugs.launchpad.net/bugs/744794
You received this bug notification because you are a member of Ubuntu Bugs,
which is subscribed to the bug report.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs