SB2026040354 - openEuler 24.03 LTS SP2 update for squid
Published: April 3, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Use After Free (CVE-ID: CVE-2026-32748)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to use-after-free in ICP request handling when processing ICP traffic. A remote attacker can send a specially crafted ICP request to cause a denial of service.
The vulnerability is only exploitable on Squid deployments that have ICP support enabled via a non-zero icp_port configuration.
2) Out-of-bounds read (CVE-ID: CVE-2026-33515)
The vulnerability allows a remote attacker to disclose sensitive information.
The vulnerability exists due to improper input validation in ICP message handling when processing ICP traffic. A remote attacker can send a specially crafted ICP request to disclose small amounts of memory potentially containing sensitive information.
The attack is limited to Squid deployments that explicitly enable ICP support (i.e., configure a non-zero icp_port).
3) Use After Free (CVE-ID: CVE-2026-33526)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to heap use-after-free in ICP request handling when processing ICP traffic. A remote attacker can send a specially crafted ICP request to cause a denial of service.
The attack is limited to Squid deployments that have ICP support enabled via a non-zero icp_port configuration.
Remediation
Install update from vendor's website.