Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.
https://security.gentoo.org/glsa/201607-01
https://access.redhat.com/errata/RHSA-2016:1140
https://access.redhat.com/errata/RHSA-2016:1139
https://access.redhat.com/errata/RHSA-2016:1138
http://www.ubuntu.com/usn/USN-2995-1
http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
http://www.securitytracker.com/id/1035647
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/86788
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.openwall.com/lists/oss-security/2016/04/20/9
http://www.openwall.com/lists/oss-security/2016/04/20/6
http://www.debian.org/security/2016/dsa-3625
http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html