CVE-2021-46784: In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=69e685162ba2ccf86cf04e7ba544718bc9ae41d4 commit 69e685162ba2ccf86cf04e7ba544718bc9ae41d4 Author: Sam James <sam@gentoo.org> AuthorDate: 2022-09-24 06:19:24 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2022-09-29 02:14:37 +0000 net-proxy/squid: add 5.7 Bug: https://bugs.gentoo.org/858845 Bug: https://bugs.gentoo.org/872551 Closes: https://bugs.gentoo.org/706126 Closes: https://bugs.gentoo.org/869968 Signed-off-by: Sam James <sam@gentoo.org> net-proxy/squid/Manifest | 1 + net-proxy/squid/squid-5.7.ebuild | 362 +++++++++++++++++++++++++++++++++++++++ 2 files changed, 363 insertions(+)
This has been long since fixed, can this bug be closed please?
commit 8b6de11b7479f646a9f935ca3295aae637b124aa Author: Hank Leininger <hlein@korelogic.com> Date: Sat Jun 17 12:34:30 2023 -0600 net-proxy/squid: drop 4.17-r1 Signed-off-by: Hank Leininger <hlein@korelogic.com> Closes: https://github.com/gentoo/gentoo/pull/31518 Signed-off-by: Sam James <sam@gentoo.org>