http://bugs.winehq.org/show_bug.cgi?id=23321 --- Comment #14 from Sergio Callegari <scallegari(a)arces.unibo.it> 2013-06-18 04:10:56 CDT --- Bug is still there in the 1.6 RCs. If I understand correctly, what happens is that when there is a space in a path, a call to execute the file pointed to that path will actually and unexpectedly result in executing a file residing at the location pointed by the path truncated at the space (if it exists) I have a bad feeling that this could be exploited maliciously, forging situations where the user thinks he is doing this and instead ends up doing that. -- Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email Do not reply to this email, post in Bugzilla using the above URL to reply. ------- You are receiving this mail because: ------- You are watching all bug changes.