Security audit handled by the openSUSE security team ( https://bugzilla.suse.com/show_bug.cgi?id=904060) found "a lot of stack and heap overflows via sprintf(...,"%s",...) calls with input from config files (sprintf in .y file) and command line args."
to follow the patch that should fix the issue. Please review and merge upstream.
Security audit handled by the openSUSE security team ( https://bugzilla.suse.com/show_bug.cgi?id=904060) found "a lot of stack and heap overflows via sprintf(...,"%s",...) calls with input from config files (sprintf in .y file) and command line args."
to follow the patch that should fix the issue. Please review and merge upstream.