[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#318879: marked as done (udpkg: Fix minor memory leak)



Your message dated Tue, 02 Nov 2010 19:17:30 +0000
with message-id <E1PDMMM-0006rc-4w@franck.debian.org>
and subject line Bug#318879: fixed in udpkg 1.10
has caused the Debian Bug report #318879,
regarding udpkg: Fix minor memory leak
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
318879: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318879
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: udpkg
Version: 1.01
Tags: patch

I believe there is a minor memory leak in udpkg.  This patch fixes it.
It will need a review and some testing before it is commited.

Index: status.c
===================================================================
--- status.c	(revisjon 29314)
+++ status.c	(arbeidskopi)
@@ -106,6 +111,8 @@
 		strcat(multiple_lines, " ");
 		strcat(multiple_lines, buf);
 	}
+	if (NULL != *ml)
+		free(*ml);
         *ml = multiple_lines;
 	ungetc(ch, f);
 	return EXIT_SUCCESS;


--- End Message ---
--- Begin Message ---
Source: udpkg
Source-Version: 1.10

We believe that the bug you reported is fixed in the latest version of
udpkg, which is due to be installed in the Debian FTP archive:

udpkg_1.10.dsc
  to main/u/udpkg/udpkg_1.10.dsc
udpkg_1.10.tar.gz
  to main/u/udpkg/udpkg_1.10.tar.gz
udpkg_1.10_i386.udeb
  to main/u/udpkg/udpkg_1.10_i386.udeb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 318879@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Perrier <bubulle@debian.org> (supplier of updated udpkg package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 02 Nov 2010 19:45:51 +0100
Source: udpkg
Binary: udpkg
Architecture: source i386
Version: 1.10
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team <debian-boot@lists.debian.org>
Changed-By: Christian Perrier <bubulle@debian.org>
Description: 
 udpkg      - tiny dpkg clone (udeb)
Closes: 318879 602134
Changes: 
 udpkg (1.10) unstable; urgency=low
 .
   * Team upload
   * Fix memory leak. Closes: #318879
   * Rebuild after running autogen.sh. Closes: #602134
Checksums-Sha1: 
 9920907a471ec74c1d36a2c85dd149f459d1eca9 1469 udpkg_1.10.dsc
 40c87a75a4a195b7db4cf7928ae82a23aa0b357b 17719 udpkg_1.10.tar.gz
 112f8187fe0e08af3c50921dfd16cbdc6f3525d0 7536 udpkg_1.10_i386.udeb
Checksums-Sha256: 
 efba0afc6bb07f3015f4ffb49e0cbcfd3ce62bfda75fbaa6f74549e4fba8cd60 1469 udpkg_1.10.dsc
 0c51107a381a2f649194acf2c32df2017484ac1c359b07f5f7f1231a6ca68aa5 17719 udpkg_1.10.tar.gz
 c96ceb7206f8fa3b5b409ebf37ee5621e857dd18d68f1d9d8e4b1e269c73e96b 7536 udpkg_1.10_i386.udeb
Files: 
 c39b0e5c6505a6da412b51aed4c00f2d 1469 debian-installer standard udpkg_1.10.dsc
 e4a00bb0fb2f5f8d22e646a74de7ee53 17719 debian-installer standard udpkg_1.10.tar.gz
 8e68562aed2c155bf3dec97d4d95dac7 7536 debian-installer standard udpkg_1.10_i386.udeb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQIVAwUBTNBfKocvcCxNbiWoAQIY/RAAuL88aOkvmbPuaO5H7y0ZZO0HGXeXxmLL
Dl3fKtihKQC+kbrVDGzGy9tbJL91k2UtnY2v+AGRmdH6xDhKsJcKzVRACx35KYEq
7rQTmqR9WrzTtmpvGBcjFcAfuienLsxGUcspnDMZYh+qXkmEl+G8bpjJxfL4ffZh
T/NHnZwWqkJb7jBT0f29ZxT2udAZDQ5FRMf9cgmiG97SwrW30S6RPt5Eu1yIRaHz
RyGdGX3ySNJ5GDujVn3uomxeYZ7kfc6KAx+xLstLQbpKK36CnygXQLB+O1k88TJU
rZNAdeQGZq//h1s6FNnTj8xOQlzmKhMLO15P/lssykgudeDLji+7ywiipbU0uFI2
KRncOK6O/NkVlB1HWs0cdUfWrPPl5/nutldmE3hJSGSUlZ7N8uPgweSL5KPPfAPM
3JLk4hXyLM8hdlAPqueVfg0xyEIJDqtqMStoebMEpQ/h7adBOPUoLESlFUQ6KWXD
LR7H9cruUY7qABC9oB9E6G3V0xW+MK+DL2heAkpff1Xfttj8kqMqQSOfk1fx66TJ
8TkWxu46mBGYP26SVeK6IWzQUJQDY4R8rdRFBZ9y5qjfNXb4jabUur+ztKP6Vmxi
4dPK1phRVa9JB7fBPunkuQLi13wtghUI0QNQXMeJsDo5gUjeAJuKEV/7w6Qf93l1
qU4OtLonkw0=
=B/cS
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: