Public bug reported:

Binary package hint: libapache2-mod-auth-pgsql

I have web site (with apache2) and when I use a pgsql authentification
to access it, I can see a (huge) memory leak.

I use libapache2-mod-auth-pgsql Version : 2.0.3-4build1. Gutsy-server.

Repport of "valgrind --leak-check=full --show-reachable=yes apache2 -X
-k start"

"""
==14493== 97,020,716 bytes in 2,228 blocks are indirectly lost in loss record 
14 of 14
==14493==    at 0x4022765: malloc (vg_replace_malloc.c:149)
==14493==    by 0x4557C9D: (within /usr/lib/i686/cmov/libcrypto.so.0.9.8)
==14493==    by 0x455831E: CRYPTO_malloc (in 
/usr/lib/i686/cmov/libcrypto.so.0.9.8)
==14493==    by 0x461A587: (within /usr/lib/i686/cmov/libcrypto.so.0.9.8)
==14493==    by 0x461A1BA: COMP_CTX_new (in 
/usr/lib/i686/cmov/libcrypto.so.0.9.8)
==14493==    by 0x44FBFAA: tls1_change_cipher_state (in 
/usr/lib/i686/cmov/libssl.so.0.9.8)
==14493==    by 0x44F3632: ssl3_connect (in /usr/lib/i686/cmov/libssl.so.0.9.8)
==14493==    by 0x4505399: SSL_connect (in /usr/lib/i686/cmov/libssl.so.0.9.8)
==14493==    by 0x41EBFC3: (within /usr/lib/libpq.so.5.0)
==14493==    by 0x41DDA1F: PQconnectPoll (in /usr/lib/libpq.so.5.0)
==14493==    by 0x41DE7AE: (within /usr/lib/libpq.so.5.0)
==14493==    by 0x41E0081: PQsetdbLogin (in /usr/lib/libpq.so.5.0)
==14493==
==14493== LEAK SUMMARY:
==14493==    definitely lost: 134,540 bytes in 338 blocks.
==14493==    indirectly lost: 97,022,457 bytes in 2,258 blocks.
==14493==      possibly lost: 9,448,400 bytes in 163 blocks.
==14493==    still reachable: 1,614,260 bytes in 1,957 blocks.
==14493==         suppressed: 0 bytes in 0 blocks.
"""

** Affects: libapache2-mod-auth-pgsql (Ubuntu)
     Importance: Undecided
         Status: New

-- 
Memory leak libapache2-mod-auth-pgsql
https://bugs.launchpad.net/bugs/186339
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to