Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#79810 - [glibc] Potential memory leak in ahostsv4/ahostsv6
Attached to Project:
Arch Linux
Opened by Frantisek Sumsal (mrc0mmand) - Thursday, 28 September 2023, 19:56 GMT
Last edited by Toolybird (Toolybird) - Friday, 29 September 2023, 07:07 GMT
Opened by Frantisek Sumsal (mrc0mmand) - Thursday, 28 September 2023, 19:56 GMT
Last edited by Toolybird (Toolybird) - Friday, 29 September 2023, 07:07 GMT
|
DetailsDescription:
Hey! During a regular image update in our upstream systemd CI, the ASan+UBSan job started complaining about a possible memory leak when running `getent ahostsv4 -s mymachines ...`. After some digging I can reproduce it even without systemd involvement: # LD_PRELOAD=/usr/lib64/libasan.so.8 getent ahostsv4 localhost 127.0.0.1 STREAM localhost 127.0.0.1 DGRAM 127.0.0.1 RAW ================================================================= ==179818==ERROR: LeakSanitizer: detected memory leaks Direct leak of 10 byte(s) in 1 object(s) allocated from: #0 0x7f15ebee1359 in __interceptor_malloc /usr/src/debug/gcc/gcc/libsanitizer/asan/asan_malloc_linux.cpp:69 #1 0x7f15ebcc13de in __strdup (/usr/lib/libc.so.6+0xa33de) (BuildId: 023ea16fd6c04ef9cf094507024e6ecdb35e02ca) #2 0x7f15eabf0073 (<unknown module>) SUMMARY: AddressSanitizer: 10 byte(s) leaked in 1 allocation(s). This is reproducible only with glibc 2.38-4. With glibc 2.38-3 everything seems to work as expected: # LD_PRELOAD=/usr/lib64/libasan.so.8 getent ahostsv4 localhost 127.0.0.1 STREAM localhost 127.0.0.1 DGRAM 127.0.0.1 RAW Since the stack trace is not complete, I can't tell for sure if it's an actual issue or not, but it's definitely something new that was introduced in 2.38-4. Additional info: * package version(s) glibc 2.38-4 |
This task depends upon
Closed by Toolybird (Toolybird)
Friday, 29 September 2023, 07:07 GMT
Reason for closing: Fixed
Additional comments about closing: glibc 2.38-5
Friday, 29 September 2023, 07:07 GMT
Reason for closing: Fixed
Additional comments about closing: glibc 2.38-5
[1] https://gitlab.archlinux.org/archlinux/packaging/packages/glibc/-/commit/25032a8abb2760257c3dceb78e649a0a2c4e3ab2
[2] https://github.com/bminor/glibc/compare/ced101ed9d3b7cfd12d97ef24940cb00b8658c81...0e1ef6779a90bc0f8a05bc367796df2793deecaa
[3] https://github.com/bminor/glibc/commit/00ae4f10b504bc4564e9f22f00907093f1ab9338
[4] https://github.com/bminor/glibc/commit/b25508dd774b617f99419bdc3cf2ace4560cd2d6
[0] https://github.com/bminor/glibc/commit/ec6b95c3303c700eb89eebeda2d7264cc184a796
https://github.com/bminor/glibc/commit/ec6b95c3303c700eb89eebeda2d7264cc184a796