DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://issues.apache.org/bugzilla/show_bug.cgi?id=21376>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=21376 Memory increase with HTTPS access [EMAIL PROTECTED] changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |DUPLICATE ------- Additional Comments From [EMAIL PROTECTED] 2004-04-01 14:00 ------- Bug 26562 tracked down two issues which might affect you in 2.0.49: 1. some versions of OpenSSL have a memory leak in the "blinding" structures when used from a threaded server 2. there was a memory leak in the use of the session cache Bug 25667 has a memory leak in the dbm session cache. Please reopen if the problem is none of the above. *** This bug has been marked as a duplicate of 25667 *** --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
