Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits. This issue is very similar to CVE-2021-43304, but the vulnerable copy operation is in a different wildCopy call.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "18.16.1+ds-7ubuntu0.1", "binary_name": "clickhouse-client" }, { "binary_version": "18.16.1+ds-7ubuntu0.1", "binary_name": "clickhouse-client-dbgsym" }, { "binary_version": "18.16.1+ds-7ubuntu0.1", "binary_name": "clickhouse-common" }, { "binary_version": "18.16.1+ds-7ubuntu0.1", "binary_name": "clickhouse-common-dbgsym" }, { "binary_version": "18.16.1+ds-7ubuntu0.1", "binary_name": "clickhouse-server" }, { "binary_version": "18.16.1+ds-7ubuntu0.1", "binary_name": "clickhouse-server-dbgsym" }, { "binary_version": "18.16.1+ds-7ubuntu0.1", "binary_name": "clickhouse-tools" }, { "binary_version": "18.16.1+ds-7ubuntu0.1", "binary_name": "clickhouse-tools-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "18.16.1+ds-7.4build2", "binary_name": "clickhouse-client" }, { "binary_version": "18.16.1+ds-7.4build2", "binary_name": "clickhouse-client-dbgsym" }, { "binary_version": "18.16.1+ds-7.4build2", "binary_name": "clickhouse-common" }, { "binary_version": "18.16.1+ds-7.4build2", "binary_name": "clickhouse-common-dbgsym" }, { "binary_version": "18.16.1+ds-7.4build2", "binary_name": "clickhouse-server" }, { "binary_version": "18.16.1+ds-7.4build2", "binary_name": "clickhouse-server-dbgsym" }, { "binary_version": "18.16.1+ds-7.4build2", "binary_name": "clickhouse-tools" }, { "binary_version": "18.16.1+ds-7.4build2", "binary_name": "clickhouse-tools-dbgsym" } ] }