Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.
lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
www.debian.org/security/2016/dsa-3625
www.openwall.com/lists/oss-security/2016/04/20/6
www.openwall.com/lists/oss-security/2016/04/20/9
www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
www.securityfocus.com/bid/86788
www.securityfocus.com/bid/91787
www.securitytracker.com/id/1035647
www.squid-cache.org/Advisories/SQUID-2016_6.txt
www.ubuntu.com/usn/USN-2995-1
access.redhat.com/errata/RHSA-2016:1138
access.redhat.com/errata/RHSA-2016:1139
access.redhat.com/errata/RHSA-2016:1140
security.gentoo.org/glsa/201607-01