DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://nagoya.apache.org/bugzilla/show_bug.cgi?id=24991>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=24991 mod_proxy_http leaks memory when using HTTP POST requests [EMAIL PROTECTED] changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED Keywords| |PatchAvailable Resolution|FIXED | ------- Additional Comments From [EMAIL PROTECTED] 2003-12-09 21:52 ------- the patch looks simple (and correct) enough... any idea if the short-circuit test for EOS just above this leaks that bucket too? I'm referring to this logic: if (APR_BUCKET_IS_EOS(APR_BRIGADE_FIRST(bb))) { break; } It looks to me like that simple brigade will get leaked in that condition. I'm re-opening the bug and adding the PatchAvailable keyword; until somebody commits your fix to 2.1-dev, it should be visible by everybody as something to work on. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
