squid is vulnerable to denial of service. The vulnerability exists due to incorrect pointer handling when processing ESI Responses which allows an attacker to crash the application via malicious input.
www.squid-cache.org/Advisories/SQUID-2018_1.txt
www.squid-cache.org/Versions/
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index
access.redhat.com/errata/RHSA-2020:1068
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1680022
bugzilla.redhat.com/show_bug.cgi?id=1717430
lists.debian.org/debian-lts-announce/2018/02/msg00001.html
usn.ubuntu.com/3557-1/
usn.ubuntu.com/4059-2/
www.debian.org/security/2018/dsa-4122