Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 903716 (CVE-2023-25076) - <www-servers/sniproxy-0.6.1: buffer overflow resulting in arbitrary code execution
Summary: <www-servers/sniproxy-0.6.1: buffer overflow resulting in arbitrary code exec...
Alias: CVE-2023-25076
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
Whiteboard: ~1 [noglsa]
Keywords: PullRequest
Depends on:
Reported: 2023-04-03 03:46 UTC by John Helmert III
Modified: 2023-04-16 06:56 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-03 03:46:16 UTC

A buffer overflow vulnerability exists in the handling of wildcard backend hosts of SNIProxy 0.6.0-2 and the master branch (commit: 822bb80df9b7b345cc9eba55df74a07b498819ba). A specially crafted HTTP, TLS or DTLS packet can lead to arbitrary code execution. An attacker could send a malicious packet to trigger this vulnerability.

Talos gave us a fix in the CVE for once. Please bump to 0.6.1.
Comment 1 Larry the Git Cow gentoo-dev 2023-04-16 06:55:59 UTC
The bug has been referenced in the following commit(s):

commit 4999c5e769737f642df960bdeff4b00a41740b82
Author:     Pierre-Olivier Mercier <>
AuthorDate: 2023-04-03 07:30:16 +0000
Commit:     Sam James <>
CommitDate: 2023-04-16 06:47:32 +0000

    www-servers/sniproxy: Bump to 0.6.1
    Signed-off-by: Pierre-Olivier Mercier <>
    Signed-off-by: Sam James <>

 www-servers/sniproxy/Manifest              |  1 +
 www-servers/sniproxy/sniproxy-0.6.1.ebuild | 75 ++++++++++++++++++++++++++++++
 2 files changed, 76 insertions(+)
Comment 2 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2023-04-16 06:56:29 UTC