https://bugs.openldap.org/show_bug.cgi?id=10404

--- Comment #11 from Howard Chu <[email protected]> ---
I take that back. I see that OpenSSL 3.0.13 on my Ubuntu system is leaking
memory on every connection, e.g.

   Leak, blocks, size: 0x749b7c01aeb0,19,2432      ?? (<unknown_file>:0)
     stack:       libcrypto.so.3 : ?? (<unknown_file>:0)
                  libcrypto.so.3 : ?? (<unknown_file>:0)
                  libcrypto.so.3 : ?? (<unknown_file>:0)
                  libcrypto.so.3 : ?? (<unknown_file>:0)
                  libcrypto.so.3 : ?? (<unknown_file>:0)
                  libcrypto.so.3 : ?? (<unknown_file>:0)
                  libcrypto.so.3 : ?? (<unknown_file>:0)
                  libcrypto.so.3 : ?? (<unknown_file>:0)
                  libcrypto.so.3 : ?? (<unknown_file>:0)
                  libcrypto.so.3 : ?? (<unknown_file>:0)
                  libcrypto.so.3 : ?? (<unknown_file>:0)
                     libssl.so.3 : ?? (<unknown_file>:0)
                     libssl.so.3 : ?? (<unknown_file>:0)
                     libssl.so.3 : ?? (<unknown_file>:0)
                     libssl.so.3 : ?? (<unknown_file>:0)
                     libssl.so.3 : ?? (<unknown_file>:0)
                     libssl.so.3 : ?? (<unknown_file>:0)
                     libssl.so.3 : ?? (<unknown_file>:0)
                    libldap.so.0 : tlso_session_accept (tls_o.c:876)
                    libldap.so.0 : ldap_pvt_tls_accept (tls2.c:487)
                           slapd : connection_read (connection.c:1376)
                           slapd : connection_read_thread (connection.c:1293)

Unfortunately that means this leak must be fixed in the OpenSSL library, not
something we can fix here.

-- 
You are receiving this mail because:
You are on the CC list for the issue.

Reply via email to