{"id":"RHSA-2016:1139","summary":"Red Hat Security Advisory: squid security update","modified":"2026-03-11T07:06:56.481034Z","published":"2024-09-15T23:24:03Z","upstream":["CVE-2016-4051","CVE-2016-4052","CVE-2016-4053","CVE-2016-4054","CVE-2016-4553","CVE-2016-4554","CVE-2016-4555","CVE-2016-4556"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1139"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"http://www.squid-cache.org/Advisories/SQUID-2016_5.txt"},{"type":"ARTICLE","url":"http://www.squid-cache.org/Advisories/SQUID-2016_6.txt"},{"type":"ARTICLE","url":"http://www.squid-cache.org/Advisories/SQUID-2016_7.txt"},{"type":"ARTICLE","url":"http://www.squid-cache.org/Advisories/SQUID-2016_8.txt"},{"type":"ARTICLE","url":"http://www.squid-cache.org/Advisories/SQUID-2016_9.txt"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329126"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329136"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1334233"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1334241"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1334246"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1334786"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1139.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4051"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4051"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4051"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4052"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4052"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4052"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4053"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4053"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4053"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4054"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4054"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4054"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4553"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4553"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4553"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4554"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4554"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4554"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4555"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4555"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4555"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4556"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4556"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4556"}],"affected":[{"package":{"name":"squid","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/squid"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.3.8-26.el7_2.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1139.json"}},{"package":{"name":"squid-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/squid-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.3.8-26.el7_2.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1139.json"}},{"package":{"name":"squid-sysvinit","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/squid-sysvinit"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.3.8-26.el7_2.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1139.json"}},{"package":{"name":"squid","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/squid"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.3.8-26.el7_2.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1139.json"}},{"package":{"name":"squid-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/squid-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.3.8-26.el7_2.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1139.json"}},{"package":{"name":"squid-sysvinit","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/squid-sysvinit"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.3.8-26.el7_2.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1139.json"}}],"schema_version":"1.7.5"}