Debian: DSA-5413-1: sniproxy security update | LinuxSecurity.com

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5413-1                   [email protected]
https://www.debian.org/security/                        Thorsten Alteholz
May 26, 2023                          https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : sniproxy
CVE ID         : CVE-2023-25076
Debian Bug     : 1033752

An issue has been found in sniproxy, a transparent TLS and HTTP layer 4
proxy with SNI support. Due to bad handling of wildcard backend hosts,
a crafted HTTP or TLS packet might lead to remote arbitrary code
execution.

For the stable distribution (bullseye), this problem has been fixed in
version 0.6.0-2+deb11u1.

We recommend that you upgrade your sniproxy packages.

For the detailed security status of sniproxy please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/sniproxy

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Debian: DSA-5413-1: sniproxy security update

May 26, 2023
An issue has been found in sniproxy, a transparent TLS and HTTP layer 4 proxy with SNI support

Summary

For the stable distribution (bullseye), this problem has been fixed in
version 0.6.0-2+deb11u1.

We recommend that you upgrade your sniproxy packages.

For the detailed security status of sniproxy please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/sniproxy

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Severity
An issue has been found in sniproxy, a transparent TLS and HTTP layer 4
proxy with SNI support. Due to bad handling of wildcard backend hosts,
a crafted HTTP or TLS packet might lead to remote arbitrary code
execution.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.