Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
yandex clickhouse |
||
debian debian linux 10.0 |