>>>>> "schemers" == The RT System itself via RT writes: schemers> There seems to be a memory leak when calling schemers> krb5_init_context followed by a krb5_free_context. This seems to be the result of add_error_table not checking whether the error table it's adding is already present in the et_list. >> How-To-Repeat: schemers> Run this program and top at the same time. The memory for schemers> the process keeps growing and growing. Using /usr/kerberos schemers> from Red Hat 9 there is no leak, while when using Kerberos schemers> 1.3 from MIT there is a leak. Interesting. Is it possible that Red Hat 9 has a different com_err library for its krb5 installation? I don't think any of the relevant code in our tree has changed at all recently. ---Tom