http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1054
ronniesahlberg@xxxxxxxxx changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |FIXED
------- Comment #2 from ronniesahlberg@xxxxxxxxx 2006-09-05 15:15 GMT -------
there were instances where dissect_nt_sid() would not fill in the return
sid_string pointer causing callers that rely on it ALWAYS being initialized
properly by this function to access and gfree a wild pointerfixed in svn 19154
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.