Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 920101 (CVE-2023-50269) - <net-proxy/squid-6.6: Denial of Service in HTTP Request parsing
Summary: <net-proxy/squid-6.6: Denial of Service in HTTP Request parsing
Alias: CVE-2023-50269
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
Whiteboard: B3 [glsa? cleanup]
Keywords: PullRequest
Depends on: 923910
  Show dependency tree
Reported: 2023-12-16 09:31 UTC by Jarkko Suominen
Modified: 2024-02-11 10:04 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Jarkko Suominen 2023-12-16 09:31:06 UTC
Fixed in 6.6, newest version in tree is 6.5.

Due to an Uncontrolled Recursion bug, Squid may be vulnerable to
a Denial of Service attack against HTTP Request parsing.

This problem allows a remote client to perform Denial of Service
attack by sending a large X-Forwarded-For header when the
follow_x_forwarded_for feature is configured.

Updated Packages:
This bug is fixed by Squid version 6.6.

Squid 5:
Squid 6:
Comment 1 Larry the Git Cow gentoo-dev 2024-02-06 09:45:26 UTC
The bug has been referenced in the following commit(s):

commit 2002cec99bd8545a4d143ed30e44a5df755d4bf9
Author:     Hank Leininger <>
AuthorDate: 2023-12-16 10:04:15 +0000
Commit:     Sam James <>
CommitDate: 2024-02-06 09:45:04 +0000

    net-proxy/squid: add 6.6
    Signed-off-by: Hank Leininger <>
    Signed-off-by: Sam James <>

 net-proxy/squid/Manifest         |   1 +
 net-proxy/squid/squid-6.6.ebuild | 386 +++++++++++++++++++++++++++++++++++++++
 2 files changed, 387 insertions(+)