vulnerability
Ubuntu: USN-6933-1 (CVE-2021-43305): ClickHouse vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:S/C:P/I:P/A:P) | 03/14/2022 | 08/12/2024 | 10/23/2024 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
03/14/2022
Added
08/12/2024
Modified
10/23/2024
Description
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy(op, ip, copy_end), don’t exceed the destination buffer’s limits. This issue is very similar to CVE-2021-43304, but the vulnerable copy operation is in a different wildCopy call.
Solution(s)
ubuntu-upgrade-clickhouse-commonubuntu-upgrade-clickhouse-serverubuntu-upgrade-clickhouse-tools

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.