Skip Menu | will be shut down on March 1st, 2021.

This queue is for tickets about the DBM-Deep CPAN distribution.

Report information
The Basics
Id: 103795
Status: new
Priority: 0/
Queue: DBM-Deep

Owner: Nobody in particular
Requestors: s.evan.staton [...]

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: (no value)

Subject: Memory link in hash storage with version 2.0011
Date: Fri, 17 Apr 2015 12:07:14 -0700
To: bug-DBM-Deep [...]
From: Evan Staton <s.evan.staton [...]>
Download (untitled) / with headers
text/plain 535b
I have discovered a memory leak when using a tied hash or the OO interface. Here is a simple example to demonstrate this behavior: use strict; use warnings; use DBM::Deep; my $dbm = "does_leak.dbm"; my $db = DBM::Deep->new( $dbm ); open my $list, '-|', 'cat /usr/share/dict/words' or die $!; while (my $word = <$list>) { chomp $word; $db->{$word} = 1; } close $list; I previously posted this to the github issues, sorry for the double posting. I'd be happy to create a test or provide more information. Thanks, Evan

This service is sponsored and maintained by Best Practical Solutions and runs on infrastructure.

Please report any issues with to