httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 21376] - Memory increase with HTTPS access
Date Thu, 01 Apr 2004 14:00:50 GMT
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=21376>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=21376

Memory increase with HTTPS access

jorton@redhat.com changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |DUPLICATE



------- Additional Comments From jorton@redhat.com  2004-04-01 14:00 -------
Bug 26562 tracked down two issues which might affect you in 2.0.49:

1. some versions of OpenSSL have a memory leak in the "blinding" structures when
used from a threaded server

2. there was a memory leak in the use of the session cache

Bug 25667 has a memory leak in the dbm session cache.  Please reopen if the
problem is none of the above.

*** This bug has been marked as a duplicate of 25667 ***

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message