From owner-freebsd-questions@FreeBSD.ORG Thu Sep 25 17:59:26 2014 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id C8AF055C for ; Thu, 25 Sep 2014 17:59:26 +0000 (UTC) Received: from btw.pki2.com (btw.pki2.com [IPv6:2001:470:a:6fd::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8DD7A881 for ; Thu, 25 Sep 2014 17:59:26 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) by btw.pki2.com (8.14.9/8.14.9) with ESMTP id s8PHxEsf055462; Thu, 25 Sep 2014 10:59:14 -0700 (PDT) (envelope-from freebsd@pki2.com) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pki2.com; s=pki2; t=1411667954; bh=4ZTtWLFNyCdB0d002HToVjxIOe/ro86xzidgIDLrp0w=; h=Subject:From:To:Cc:In-Reply-To:References:Date; b=fslRNUwzaVRicIVL+7ULCtlwRAtShPhRend+7r+32OyMhySav6lITAjdt/7R/hIQR MN5Rmv0nP7Mc/l1jXa9do+xUjRcK2fPqhzbMa/8X8OPdz1JuCk//oqdh9E79/+Bl8Z PuV1boVxL+6cSZla+KaJVRBNsWY+OU7aco7g5XVjr+LKadBng+atauGB/NWzysgSO3 p6zepolrnSshLltiRfUBZ9EclH5AC+2umMnNC2iLwstZrTPoyjf2uVyyjcRVbAcoLA QICg5LzQA5nJCaOglHkf7wzI4GFuJZltuzR+PgPlDCODfzagRU79UPca8gFEiZcEyN xhdzuPJ7Hayiw== Subject: Re: squid-3.4.8_1 leaking memory From: Dennis Glatting To: Victor Sudakov In-Reply-To: <20140925165533.GB81782@admin.sibptus.tomsk.ru> References: <20140925045657.GA71070@admin.sibptus.tomsk.ru> <1411642468.3895.847.camel@btw.pki2.com> <20140925110428.GA79336@admin.sibptus.tomsk.ru> <1411644140.3895.860.camel@btw.pki2.com> <20140925165533.GB81782@admin.sibptus.tomsk.ru> Content-Type: text/plain; charset="ISO-8859-1" Date: Thu, 25 Sep 2014 10:59:14 -0700 Message-ID: <1411667954.3895.870.camel@btw.pki2.com> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port Content-Transfer-Encoding: 7bit X-SoftwareMunitions-MailScanner-Information: Dennis Glatting X-SoftwareMunitions-MailScanner-ID: s8PHxEsf055462 X-SoftwareMunitions-MailScanner: Found to be clean X-MailScanner-From: freebsd@pki2.com Cc: freebsd-questions@freebsd.org X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 Sep 2014 17:59:26 -0000 Against 3.4.7, none of the patch sets apply. 3.3 was EoL on 28Aug2014. The Squid Cache web site still lists 3.4.7 as the latest stable release: http://www.squid-cache.org/Versions/v3/3.4/ However, I see multiple mentions of 3.4.8, such as: http://west.squid-cache.org/Advisories/SQUID-2014_3.txt I also see confusion between 3.4.7 and 3.4.8. Count me as one of them.