Bug 2451581 (CVE-2026-33515) - CVE-2026-33515 Squid: Squid: Information disclosure via improper input validation in ICP traffic
Summary: CVE-2026-33515 Squid: Squid: Information disclosure via improper input valida...
Keywords:
Status: NEW
Alias: CVE-2026-33515
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-26 01:02 UTC by OSIDB Bzimport
Modified: 2026-03-26 05:14 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-26 01:02:11 UTC
Squid is a caching proxy for the Web. Prior to version 7.5, due to improper input validation, Squid is vulnerable to out of bounds read when handling ICP traffic. This problem allows a remote attacker to receive small amounts of memory potentially containing sensitive information when responding with errors to invalid ICP requests. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem cannot be mitigated by denying ICP queries using `icp_access` rules. Version 7.5 contains a patch.


Note You need to log in before you can comment on or make changes to this bug.