https://bugzilla.novell.com/show_bug.cgi?id=785393 https://bugzilla.novell.com/show_bug.cgi?id=785393#c3 --- Comment #3 from Stephan Kulow <coolo@suse.com> 2012-10-17 12:06:59 CEST --- hmm, so this was not upstream's idea? That makes it hard to report it to cpan ;( They use xmalloc on purpose: /* * Use xmalloc() and xfree() instead of New() and Safefree(), * because this block may be reallocated by the GNU Readline Library. */ if (str_tbl[id].accessed && *str_tbl[id].var) { /* * First time a variable is used by this routine, * it may be a static area. So it cannot be freed. */ xfree(*str_tbl[id].var); *str_tbl[id].var = NULL; } -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.