public inbox for glibc-bugs@sourceware.org help / color / mirror / Atom feed
From: "nunoplopes at sapo dot pt" <sourceware-bugzilla@sources.redhat.com> To: glibc-bugs@sources.redhat.com Subject: [Bug libc/294] New: inet_ntoa leak Date: Sat, 31 Jul 2004 12:32:00 -0000 [thread overview] Message-ID: <20040731123227.294.nunoplopes@sapo.pt> (raw) inet_ntoa is leaking PHP 5.1: ==14229== 18 bytes in 1 blocks are still reachable in loss record 1 of 3 ==14229== at 0x40026BB2: malloc (vg_replace_malloc.c:153) ==14229== by 0x4058638B: inet_ntoa (in /lib/libc-2.3.3.so) ==14229== by 0x81BE8BE: php_network_populate_name_from_sockaddr (network.c:593) ==14229== by 0x81CA06C: php_sockop_set_option (xp_socket.c:223) ==14229== by 0x81C27BB: _php_stream_set_option (streams.c:1110) ==14229== by 0x81C988A: php_stream_xport_recvfrom (transports.c:433) ==14229== by 0x81A4FED: zif_stream_socket_recvfrom (streamsfuncs.c:328) ==14229== by 0x8209810: zend_do_fcall_common_helper (zend_execute.c:2699) ==14229== by 0x82099FE: zend_do_fcall_handler (zend_execute.c:2831) ==14229== by 0x8205FF7: execute (zend_execute.c:1391) ==14229== by 0x81E9D59: zend_execute_scripts (zend.c:1068) ==14229== by 0x81B443F: php_execute_script (main.c:1631) ==14229== by 0x821118F: main (php_cli.c:943) ==14229== by 0x404E1858: __libc_start_main (in /lib/libc-2.3.3.so) ==14229== by 0x8080550: (within /usr/local/bin/php) ==14229== ==14229== ==14229== 100 bytes in 1 blocks are still reachable in loss record 2 of 3 ==14229== at 0x40026BB2: malloc (vg_replace_malloc.c:153) ==14229== by 0x81D353B: yy_flex_alloc (zend_language_scanner.c:6260) ==14229== by 0x81D33DB: yy_push_state (zend_language_scanner.c:6149) ==14229== by 0x81D0B02: lex_scan (zend_language_scanner.l:1152) ==14229== by 0x81DDE90: zendlex (zend_compile.c:3682) ==14229== by 0x81CEE8C: zendparse (zend_language_parser.c:2632) ==14229== by 0x81CF2F2: compile_file (zend_language_scanner.l:375) ==14229== by 0x81E9D21: zend_execute_scripts (zend.c:1064) ==14229== by 0x81B443F: php_execute_script (main.c:1631) ==14229== by 0x821118F: main (php_cli.c:943) ==14229== by 0x404E1858: __libc_start_main (in /lib/libc-2.3.3.so) ==14229== by 0x8080550: (within /usr/local/bin/php) -- Summary: inet_ntoa leak Product: glibc Version: 2.3.3 Status: NEW Severity: normal Priority: P2 Component: libc AssignedTo: gotom at debian dot or dot jp ReportedBy: nunoplopes at sapo dot pt CC: glibc-bugs at sources dot redhat dot com http://sources.redhat.com/bugzilla/show_bug.cgi?id=294 ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
next reply other threads:[~2004-07-31 12:32 UTC|newest] Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top 2004-07-31 12:32 nunoplopes at sapo dot pt [this message] 2004-08-02 15:55 ` [Bug libc/294] " jakub at redhat dot com
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20040731123227.294.nunoplopes@sapo.pt \ --to=sourceware-bugzilla@sources.redhat.com \ --cc=glibc-bugs@sources.redhat.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).