https://bugs.openldap.org/show_bug.cgi?id=10404
--- Comment #11 from Howard Chu <[email protected]> --- I take that back. I see that OpenSSL 3.0.13 on my Ubuntu system is leaking memory on every connection, e.g. Leak, blocks, size: 0x749b7c01aeb0,19,2432 ?? (<unknown_file>:0) stack: libcrypto.so.3 : ?? (<unknown_file>:0) libcrypto.so.3 : ?? (<unknown_file>:0) libcrypto.so.3 : ?? (<unknown_file>:0) libcrypto.so.3 : ?? (<unknown_file>:0) libcrypto.so.3 : ?? (<unknown_file>:0) libcrypto.so.3 : ?? (<unknown_file>:0) libcrypto.so.3 : ?? (<unknown_file>:0) libcrypto.so.3 : ?? (<unknown_file>:0) libcrypto.so.3 : ?? (<unknown_file>:0) libcrypto.so.3 : ?? (<unknown_file>:0) libcrypto.so.3 : ?? (<unknown_file>:0) libssl.so.3 : ?? (<unknown_file>:0) libssl.so.3 : ?? (<unknown_file>:0) libssl.so.3 : ?? (<unknown_file>:0) libssl.so.3 : ?? (<unknown_file>:0) libssl.so.3 : ?? (<unknown_file>:0) libssl.so.3 : ?? (<unknown_file>:0) libssl.so.3 : ?? (<unknown_file>:0) libldap.so.0 : tlso_session_accept (tls_o.c:876) libldap.so.0 : ldap_pvt_tls_accept (tls2.c:487) slapd : connection_read (connection.c:1376) slapd : connection_read_thread (connection.c:1293) Unfortunately that means this leak must be fixed in the OpenSSL library, not something we can fix here. -- You are receiving this mail because: You are on the CC list for the issue.
