https://bugzilla.novell.com/show_bug.cgi?id=785393
https://bugzilla.novell.com/show_bug.cgi?id=785393#c3
--- Comment #3 from Stephan Kulow 2012-10-17 12:06:59 CEST ---
hmm, so this was not upstream's idea? That makes it hard to report it to cpan
;(
They use xmalloc on purpose:
/*
* Use xmalloc() and xfree() instead of New() and Safefree(),
* because this block may be reallocated by the GNU Readline Library.
*/
if (str_tbl[id].accessed && *str_tbl[id].var) {
/*
* First time a variable is used by this routine,
* it may be a static area. So it cannot be freed.
*/
xfree(*str_tbl[id].var);
*str_tbl[id].var = NULL;
}
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.