Red Hat Bugzilla – Bug 862566
ares_parse_aaaa_reply can leak memory
Last modified: 2014-10-14 02:44:36 EDT
Description of problem:
Upstream commit 50f25d8a4b2d16f4c5e0ef620238688b7a315c7a fixed a memory leak in ares_parse_aaaa_reply in the case IPv6 resolution succeeded. We should be aware of the issue.
Version-Release number of selected component (if applicable):
valgrind, code inspection
Petr, this bug is solved by the rebase tracked by bz #1077544, can you add qa_ack?
Sorry, there were two leaks and one of them got reverted. The other should still be valid, though:
Can you try with an address that resolves to CNAMEs only? Looking at the code, that should do the trick.
(In reply to Jakub Hrozek from comment #8)
> Sorry, there were two leaks and one of them got reverted. The other should
> still be valid, though:
Gah, this is the one that got reverted actually. This is the valid one:
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory, and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.