It was discovered that SNI Proxy did not properly handle wildcard backend hosts. An attacker could possibly use this issue to cause a buffer overflow, resulting in a denial of service, or arbitrary code execution.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "0.5.0-2ubuntu0.1~esm1", "binary_name": "sniproxy" }, { "binary_version": "0.5.0-2ubuntu0.1~esm1", "binary_name": "sniproxy-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.6.0-1ubuntu0.1", "binary_name": "sniproxy" }, { "binary_version": "0.6.0-1ubuntu0.1", "binary_name": "sniproxy-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.6.0-2ubuntu0.22.04.1", "binary_name": "sniproxy" }, { "binary_version": "0.6.0-2ubuntu0.22.04.1", "binary_name": "sniproxy-dbgsym" } ] }