Bug 2451577 (CVE-2026-32748) - CVE-2026-32748 Squid: Squid: Denial of Service via crafted ICP traffic
Summary: CVE-2026-32748 Squid: Squid: Denial of Service via crafted ICP traffic
Keywords:
Status: NEW
Alias: CVE-2026-32748
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2451600 2451601
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-26 01:01 UTC by OSIDB Bzimport
Modified: 2026-03-31 20:03 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:6301 0 None None None 2026-03-31 20:03:45 UTC

Description OSIDB Bzimport 2026-03-26 01:01:54 UTC
Squid is a caching proxy for the Web. Prior to version 7.5, due to premature release of resource during expected lifetime and heap Use-After-Free bugs, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service attack against the Squid service using ICP protocol. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem _cannot_ be mitigated by denying ICP queries using `icp_access` rules. This bug is fixed in Squid version 7.5.

Comment 2 errata-xmlrpc 2026-03-31 20:03:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:6301 https://access.redhat.com/errata/RHSA-2026:6301


Note You need to log in before you can comment on or make changes to this bug.