DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=21376>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=21376

Memory increase with HTTPS access

[EMAIL PROTECTED] changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |DUPLICATE



------- Additional Comments From [EMAIL PROTECTED]  2004-04-01 14:00 -------
Bug 26562 tracked down two issues which might affect you in 2.0.49:

1. some versions of OpenSSL have a memory leak in the "blinding" structures when
used from a threaded server

2. there was a memory leak in the use of the session cache

Bug 25667 has a memory leak in the dbm session cache.  Please reopen if the
problem is none of the above.

*** This bug has been marked as a duplicate of 25667 ***

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to