Content-Type: text/plain Content-Disposition: inline Content-Transfer-Encoding: binary MIME-Version: 1.0 X-Mailer: MIME-tools 5.420 (Entity 5.420) RT-Send-CC: X-RT-Original-Encoding: iso-8859-1 Content-Length: 594 [tlyu - Tue Feb 27 17:41:27 2007]: > pull up r19171 from trunk > > r19171@cathode-dark-space: raeburn | 2007-02-23 19:56:23 -0500 > ticket: 5445 > status: open > > If a reflection is detected, zap the message buffer pointer output > argument as well as actually freeing the buffer. (Found while using > the gsstest option to exercise error conditions.) > > > > Commit By: tlyu > > > > Revision: 19186 > Changed Files: > _U branches/krb5-1-6/ > U branches/krb5-1-6/src/lib/gssapi/krb5/k5unseal.c For the record, this is the vulnerability described in MITKRB5-SA-2007-003.