|
|
Message-ID: <20260328023834.GA15295@openwall.com> Date: Sat, 28 Mar 2026 03:38:34 +0100 From: Solar Designer <solar@...nwall.com> To: Amos Jeffries <squid3@...enet.co.nz> Cc: oss-security@...ts.openwall.com Subject: Re: [ADVISORY] SQUID-2026:1 Denial of Service in ICP Request handling (CVE-2026-33526) Hi Amos, Thank you for bringing these 3 issues/advisories to oss-security. On Wed, Mar 25, 2026 at 05:20:11PM +1300, Amos Jeffries wrote: > Due to a heap Use-After-Free bug Squid is vulnerable to Denial > of Service when handling ICP traffic. Since use-after-free bugs commonly allow for impact not limited to DoS, but often also code execution and/or information leak, it would help if you provide justification why you claim this is just a DoS - or add wording that it may be more than just a DoS. Ditto for SQUID-2026:2 (CVE-2026-32748). Thanks, Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.