When using the ch-go library, under a specific condition when the query includes a large, uncompressed malicious external data, it is possible for an attacker in control of such data to smuggle another query packet into the connection stream.
If you are using ch-go library, we recommend you to update to at least version 0.65.0.
This issue was found by lixts and reported through our bugcrowd program.
{ "nvd_published_at": "2025-04-11T05:15:29Z", "cwe_ids": [ "CWE-444" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-04-12T03:41:21Z" }