------- Comment #2 from jakub at gcc dot gnu dot org  2009-12-03 10:03 -------
Testing a fix.
That said, hope you are aware that strcpy of arbitrary program arguments into a
fixed length buffer on the stack without checking the length means anyone can
overflow it, and in some cases even execute arbitrary code?


-- 


http://gcc.gnu.org/bugzilla/show_bug.cgi?id=42049

Reply via email to