Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <7c5d8f66-3433-4dfb-8cd2-5f5a9dbfa0f0@treenet.co.nz>
Date: Wed, 25 Mar 2026 17:22:07 +1300
From: Amos Jeffries <squid3@...enet.co.nz>
To: oss-security@...ts.openwall.com
Subject: [ADVISORY] SQUID-2026:3 Out of Bounds Read in ICP message handling
 (CVE-2026-33515)

__________________________________________________________________

     Squid Proxy Cache Security Update Advisory SQUID-2026:3
__________________________________________________________________

Advisory ID:       | SQUID-2026:3 (CVE-2026-33515)
Date:              | March 25, 2026
Summary:           | Out of Bounds Read in ICP message handling
Affected versions: | Squid 3.x -> 3.5.28
                    | Squid 4.x -> 4.17
                    | Squid 5.x -> 5.9
                    | Squid 6.x -> 6.14
                    | Squid 7.x -> 7.4
Fixed in version:  | Squid 7.5
__________________________________________________________________

Problem Description:

  Due to improper input validation bugs, Squid is vulnerable to out
  of bounds reads when handling ICP traffic.

__________________________________________________________________

Severity:

  This problem allows a remote attacker to
  receive small amounts of memory potentially containing sensitive
  information when responding with errors to invalid ICP requests.

  This attack is limited to Squid deployments that explicitly
  enable ICP support (i.e. configure non-zero icp_port).

  This problem _cannot_ be mitigated by denying ICP queries
  using icp_access rules.

__________________________________________________________________

Updated Packages

  These bugs were fixed in Squid version 7.5.

  In addition, patches addressing this problem for the stable
  releases can be found in our patch archives:

Squid 7:
  <https://github.com/squid-cache/squid/commit/8138e909d2058d4401e0ad49b583afaec912b165>

Note: we are aware this patch may not apply cleanly.
   Ensure that the patch for SQUID-2026:1 is applied first.

  If you are using a prepackaged version of Squid then please
  refer to the package vendor for availability information on
  updated packages.

__________________________________________________________________

Determining if your version is vulnerable

  Run the following command to identify whether your Squid
  has been configured with ICP enabled:

   squid -k parse 2>&1 | grep -E "(icp|udp)_port" | tail -n1

  All Squid configured with port 0 are not vulnerable.

  All Squid-3.0 up to and including 7.4 configured with
  a non-zero port should be assumed to be vulnerable.

  All Squid-3.2 up to and including 7.4 configured without
  any port value can be assumed to be not vulnerable.

__________________________________________________________________

Workaround

Either,

   * Do not enable ICP support,

Or,

  * explicitly disable ICP using "icp_port 0".


  Warning: These problems _cannot_ be mitigated by denying ICP
           queries using icp_access rules.

__________________________________________________________________

Contact details for the Squid project:

  For installation / upgrade support on binary packaged versions
  of Squid: Your first point of contact should be your binary
  package vendor.

  If you install and build Squid from the original Squid sources
  then the <squid-users@...ts.squid-cache.org> mailing list is
  your primary support point. For subscription details see
  <https://www.squid-cache.org/Support/mailing-lists.html>.

  For reporting of non-security bugs in the latest STABLE release
  the squid bugzilla database should be used
  <https://bugs.squid-cache.org/>.

  For reporting of security sensitive bugs send an email to the
  <squid-bugs@...ts.squid-cache.org> mailing list. It's a closed
  list (though anyone can post) and security related bug reports
  are treated in confidence until the impact has been established.

__________________________________________________________________

Credits

  Discovered and Fixed by:

   * Joshua Rogers with ZeroPath
   * Alex Rousskov, The Measurement Factory

__________________________________________________________________

Revision history:

2025-09-07 20:22:00 EDT Report of the first set of vulnerabilities
2026-01-26 08:48:00 EDT Report of additional vulnerabilities
2026-02-12 20:28:43 UTC official fixes in master branch
__________________________________________________________________
END

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.