Your message dated Sun, 14 May 2006 02:28:17 +0200
with message-id <[EMAIL PROTECTED]>
and subject line openssl: Memory leak in SSL_dup()
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: openssl
Version: 0.9.6c-2.woody.3
Severity: normal

This is detailed in

http://www.aet.tu-cottbus.de/rt2/Ticket/Display.html?id=477

and, I think, is currently fixed upstream.

-- System Information
Debian Release: 3.0
Architecture: i386
Kernel: Linux beeblebrox 2.4.18-1-k7 #1 Sat Jun 7 00:31:02 EST 2003 i686
Locale: LANG=C, LC_CTYPE=C

Versions of packages openssl depends on:
ii  libc6                   2.2.5-11.5       GNU C Library: Shared libraries an
ii  libssl0.9.6             0.9.6c-2.woody.3 SSL shared libraries
ii  perl                    5.6.1-8.2        Larry Wall's Practical Extraction 



--- End Message ---
--- Begin Message ---
Version: 0.9.7e-3sarge1

This is atleast fixed in version 0.9.7e-3sarge1 which is currently in
sarge, so I'm closing this.


Kurt



--- End Message ---

Reply via email to