http://bugs.winehq.org/show_bug.cgi?id=23321
--- Comment #14 from Sergio Callegari scallegari@arces.unibo.it 2013-06-18 04:10:56 CDT --- Bug is still there in the 1.6 RCs.
If I understand correctly, what happens is that when there is a space in a path, a call to execute the file pointed to that path will actually and unexpectedly result in executing a file residing at the location pointed by the path truncated at the space (if it exists)
I have a bad feeling that this could be exploited maliciously, forging situations where the user thinks he is doing this and instead ends up doing that.