Wednesday, July 31, 2024

[USN-6933-1] ClickHouse vulnerabilities

-----BEGIN PGP SIGNATURE-----

wnsEABYIACMWIQSyA9nA4R5iZYAVzFrgLM9xllPy5AUCZqsVigUDAAAAAAAKCRDgLM9xllPy5JHF
AQD5taVNoIa+MNCzPtTPJk01sRSHKF4G7fyHzdgS56otZAEAspgDUDx2bj9Xsd536ars0FcRtjOE
I71q2EP3cHz3VQc=
=bjhQ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6933-1
July 31, 2024

clickhouse vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in ClickHouse.

Software Description:
- clickhouse: column-oriented database system (cli client)

Details:

It was discovered that ClickHouse incorrectly handled memory, leading to a
heap out-of-bounds data read. An attacker could possibly use this issue to
cause a denial of service, or leak sensitive information.
(CVE-2021-42387, CVE-2021-41388)

It was discovered that ClickHouse incorrectly handled memory, leading to a
heap-based buffer overflow. An attacker could possibly use this issue to
cause a denial of service, or execute arbitrary code.
(CVE-2021-43304, CVE-2021-43305)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
clickhouse-common 18.16.1+ds-7ubuntu0.1
clickhouse-server 18.16.1+ds-7ubuntu0.1
clickhouse-tools 18.16.1+ds-7ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6933-1
CVE-2021-42387, CVE-2021-42388, CVE-2021-43304, CVE-2021-43305

Package Information:
https://launchpad.net/ubuntu/+source/clickhouse/18.16.1+ds-7ubuntu0.1

No comments:

Post a Comment