{"id":"RHSA-2016:2600","summary":"Red Hat Security Advisory: squid security, bug fix, and enhancement update","modified":"2026-03-11T07:08:39.891307Z","published":"2024-09-15T23:32:04Z","upstream":["CVE-2016-2569","CVE-2016-2570","CVE-2016-2571","CVE-2016-2572","CVE-2016-3948"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:2600"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1254016"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1254018"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299972"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1312257"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1312262"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1323594"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1330186"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1336940"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2600.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-2569"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-2569"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2569"},{"type":"ARTICLE","url":"http://www.squid-cache.org/Advisories/SQUID-2016_2.txt"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-2570"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-2570"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2570"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-2571"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-2571"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2571"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-2572"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-2572"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2572"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3948"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3948"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3948"},{"type":"ARTICLE","url":"http://www.squid-cache.org/Advisories/SQUID-2016_4.txt"}],"affected":[{"package":{"name":"squid","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/squid"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.5.20-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2600.json"}},{"package":{"name":"squid-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/squid-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.5.20-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2600.json"}},{"package":{"name":"squid-migration-script","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/squid-migration-script"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.5.20-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2600.json"}},{"package":{"name":"squid-sysvinit","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/squid-sysvinit"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.5.20-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2600.json"}},{"package":{"name":"squid","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/squid"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.5.20-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2600.json"}},{"package":{"name":"squid-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/squid-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.5.20-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2600.json"}},{"package":{"name":"squid-migration-script","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/squid-migration-script"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.5.20-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2600.json"}},{"package":{"name":"squid-sysvinit","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/squid-sysvinit"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:3.5.20-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2600.json"}}],"schema_version":"1.7.5"}