Your message dated Tue, 09 Dec 2025 16:06:15 +0000
with message-id <[email protected]>
and subject line Bug#1122086: fixed in owfs 3.2p4+dfsg1-7
has caused the Debian Bug report #1122086,
regarding Memory leak in owhttpd
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1122086: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122086
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: owhttpd

Version: 3.2p4+dfsg1-6

owhttpd seems to leak 8-10 megs a day when an http request is made every minute to retrieve 1-wire data via http (json)

- a remote command such as http://<address>:9000/json/DHW (where DHW is an alias for a 1-wire sensor)

This is on Debian Trixie on Raspberrypi, kernel 6.1.21+ #1642

Google's AI reports that a memory leak was fixed in upstream version 3.2p5 a while ago, which may or may not be related?

"A significant fix was introduced via a pull request in August 2022, addressing a leak that caused owhttpd to crash under concurrent request loads. The relevant pull request on GitHub is titled #41 fix memory leak making owhttpd crash on concurrent requests"
--- End Message ---
--- Begin Message ---
Source: owfs
Source-Version: 3.2p4+dfsg1-7
Done: Vincent Danjean <[email protected]>

We believe that the bug you reported is fixed in the latest version of
owfs, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Vincent Danjean <[email protected]> (supplier of updated owfs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 09 Dec 2025 15:00:53 +0100
Source: owfs
Architecture: source
Version: 3.2p4+dfsg1-7
Distribution: unstable
Urgency: medium
Maintainer: Vincent Danjean <[email protected]>
Changed-By: Vincent Danjean <[email protected]>
Closes: 1122086
Changes:
 owfs (3.2p4+dfsg1-7) unstable; urgency=medium
 .
   * Acknowledge NMUs (thanks Bastian)
   * Fix "Memory leak in owhttpd": cherry-pick proposed commit in upstream
     PR#102 (Closes: #1122086)
Checksums-Sha1:
 98a180c5fe5e91cac8cae6f4333dd7e9569e646a 2918 owfs_3.2p4+dfsg1-7.dsc
 7e62abb28261d1a13047624e9dbda8a67e5ab038 19556 owfs_3.2p4+dfsg1-7.debian.tar.xz
 af5894fc656e3de163941bfa55692985fabe0633 8809 
owfs_3.2p4+dfsg1-7_source.buildinfo
Checksums-Sha256:
 2dcd1a500cf00190c83bf584bc46970cb6f55b1f07e1e9d9b94151dbfdbdd790 2918 
owfs_3.2p4+dfsg1-7.dsc
 78feff2fa80fc1fb7cfe25f9fb5030603d5266ebd36783ee1abc2d2f3c78f9bb 19556 
owfs_3.2p4+dfsg1-7.debian.tar.xz
 da0a37fa12ed7a395f719a7d67267431b4a8d8c04e2981022e3c05b8b314e67f 8809 
owfs_3.2p4+dfsg1-7_source.buildinfo
Files:
 0d67cb3e4644041177b7794b2f981bca 2918 electronics optional 
owfs_3.2p4+dfsg1-7.dsc
 08629eaf7e73896ab1e73a2386eb0fdd 19556 electronics optional 
owfs_3.2p4+dfsg1-7.debian.tar.xz
 df08922d270a3ac598bbf6406199749c 8809 electronics optional 
owfs_3.2p4+dfsg1-7_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=ROHb
-----END PGP SIGNATURE-----

Attachment: pgpydZzV4esDn.pgp
Description: PGP signature


--- End Message ---

Reply via email to