[Date Prev][Date Next] [Chronological] [Thread] [Top]

RE: ITS #1116 memory leak



This bug was fixed back in release 2.0.19 and is no longer present.

  -- Howard Chu
  Chief Architect, Symas Corp.       Director, Highland Sun
  http://www.symas.com               http://highlandsun.com/hyc
  Symas: Premier OpenSource Development and Support

> -----Original Message-----
> From: owner-openldap-software@OpenLDAP.org
> [mailto:owner-openldap-software@OpenLDAP.org]On Behalf Of John Green
> Sent: Thursday, May 02, 2002 10:39 AM
> To: openldap-software (E-mail)
> Subject: ITS #1116 memory leak
>
>
> Courier-IMAP has a function authenticating to LDAP that supposedly should
> not be used, as it states a memory leak (ITS #1116) in OpenLDAP interferes
> with this.  I am using Courier-IMAP-1.4.4.  Here is the comment:
> # Define this to have the ldap server authenticate passwords.  If
> LDAP_AUTHBIND
> # the password is validated by rebinding with the supplied userid and
> password.
> # If rebind succeeds, this is considered to be an authenticated request.
> This
> # does not support CRAM-MD5 authentication, which requires userPassword.
> #
> # WARNING - as of the time this note is written, there are memory leaks in
> # OpenLDAP that affect this option, see ITS #1116 in openldap.org's bug
> # tracker.  Avoid using this option until these leaks are plugged.
> On the bug tracking section:
> http://www.openldap.org/its/index.cgi/Software%20Bugs?id=1116;user
> =guest;sel
> ectid=1116;statetype=-1 the link to a patch is dead.  Does anyone know if
> this leak has been corrected in later versions of OpenLDAP, or if another
> patch is available?  I would prefer to use the RH 2.0.21 rpm's if
> possible.
> Thanks for any help  --  John