[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#318879: marked as done (udpkg: Fix minor memory leak)



Your message dated Thu, 04 Nov 2010 18:47:05 +0000
with message-id <E1PE4q1-0002ht-Nk@franck.debian.org>
and subject line Bug#318879: fixed in udpkg 1.12
has caused the Debian Bug report #318879,
regarding udpkg: Fix minor memory leak
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
318879: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318879
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: udpkg
Version: 1.01
Tags: patch

I believe there is a minor memory leak in udpkg.  This patch fixes it.
It will need a review and some testing before it is commited.

Index: status.c
===================================================================
--- status.c	(revisjon 29314)
+++ status.c	(arbeidskopi)
@@ -106,6 +111,8 @@
 		strcat(multiple_lines, " ");
 		strcat(multiple_lines, buf);
 	}
+	if (NULL != *ml)
+		free(*ml);
         *ml = multiple_lines;
 	ungetc(ch, f);
 	return EXIT_SUCCESS;


--- End Message ---
--- Begin Message ---
Source: udpkg
Source-Version: 1.12

We believe that the bug you reported is fixed in the latest version of
udpkg, which is due to be installed in the Debian FTP archive:

udpkg_1.12.dsc
  to main/u/udpkg/udpkg_1.12.dsc
udpkg_1.12.tar.gz
  to main/u/udpkg/udpkg_1.12.tar.gz
udpkg_1.12_i386.udeb
  to main/u/udpkg/udpkg_1.12_i386.udeb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 318879@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated udpkg package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 04 Nov 2010 18:26:29 +0000
Source: udpkg
Binary: udpkg
Architecture: source i386
Version: 1.12
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team <debian-boot@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 udpkg      - tiny dpkg clone (udeb)
Closes: 318879
Changes: 
 udpkg (1.12) unstable; urgency=low
 .
   * Redesign read_block interface, fixing crashes caused by memory leak fix
     (closes: #318879).
Checksums-Sha1: 
 7e69939ad9a57b551fbda79689bb8f16b67fe3df 1555 udpkg_1.12.dsc
 0df7f8f56592ca27a082713250693244505048dc 17403 udpkg_1.12.tar.gz
 8839bd51f6b27d520cce0dd4cf73accd7e5a55f7 7516 udpkg_1.12_i386.udeb
Checksums-Sha256: 
 e0ea7881dea3840f3e5f02fff9a417be373a5e8aa218641288504a773ac8f573 1555 udpkg_1.12.dsc
 adcde318c432a7793e0bb4b392e8349c93e2c5b2fed4302b223afda771e1eb86 17403 udpkg_1.12.tar.gz
 1a11c50bd98f4d3422e74ae06aaa12200e94163d560e58299fce9a574d5e9386 7516 udpkg_1.12_i386.udeb
Files: 
 e67e7c1f1b0f0391c43382bb95b05415 1555 debian-installer standard udpkg_1.12.dsc
 008a1518d9e21df6364e407e6eb07467 17403 debian-installer standard udpkg_1.12.tar.gz
 0b9fa9f5718b1bbd215df3e7b237fd70 7516 debian-installer standard udpkg_1.12_i386.udeb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer
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=ZzY1
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: