Untriaged
Squid has issues in ICP message handling
Squid is a caching proxy for the Web. Prior to version 7.5, due to improper input validation, Squid is vulnerable to out of bounds read when handling ICP traffic. This problem allows a remote attacker to receive small amounts of memory potentially containing sensitive information when responding with errors to invalid ICP requests. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem cannot be mitigated by denying ICP queries using `icp_access` rules. Version 7.5 contains a patch.
References
-
https://github.com/squid-cache/squid/security/advisories/GHSA-84p4-hcx7-jj7c x_refsource_CONFIRM
-
https://github.com/squid-cache/squid/pull/2220 x_refsource_MISC
Affected products
squid
- ==< 7.5
Matching in nixpkgs
pkgs.squid
Caching proxy for the Web supporting HTTP, HTTPS, FTP, and more
Package maintainers
-
@srhb Sarah Brofeldt <sbrofeldt@gmail.com>
-
@happysalada Raphael Megzari <raphael@megzari.com>
-
@7c6f434c Michael Raskin <7c6f434c@mail.ru>