UBUNTU-CVE-2022-44010

Source
https://ubuntu.com/security/CVE-2022-44010
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-44010.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2022-44010
Related
Published
2023-11-23T16:15:00Z
Modified
2024-10-15T14:10:16Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send a crafted HTTP request to the HTTP Endpoint (usually listening on port 8123 by default), causing a heap-based buffer overflow that crashes the process. This does not require authentication. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19.

References

Affected packages

Ubuntu:20.04:LTS / clickhouse

Package

Name
clickhouse
Purl
pkg:deb/ubuntu/clickhouse?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

18.*

18.16.1+ds-5
18.16.1+ds-5ubuntu1
18.16.1+ds-5ubuntu2
18.16.1+ds-6ubuntu1
18.16.1+ds-7
18.16.1+ds-7ubuntu0.1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / clickhouse

Package

Name
clickhouse
Purl
pkg:deb/ubuntu/clickhouse?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

18.*

18.16.1+ds-7.4
18.16.1+ds-7.4build1
18.16.1+ds-7.4build2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}