------- Comment #2 from jakub at gcc dot gnu dot org 2009-12-03 10:03 ------- Testing a fix. That said, hope you are aware that strcpy of arbitrary program arguments into a fixed length buffer on the stack without checking the length means anyone can overflow it, and in some cases even execute arbitrary code?
-- http://gcc.gnu.org/bugzilla/show_bug.cgi?id=42049