Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits. This issue is very similar to CVE-2021-43304, but the vulnerable copy operation is in a different wildCopy call.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "clickhouse-client",
"binary_version": "18.16.1+ds-7ubuntu0.1"
},
{
"binary_name": "clickhouse-common",
"binary_version": "18.16.1+ds-7ubuntu0.1"
},
{
"binary_name": "clickhouse-server",
"binary_version": "18.16.1+ds-7ubuntu0.1"
},
{
"binary_name": "clickhouse-tools",
"binary_version": "18.16.1+ds-7ubuntu0.1"
}
]
}