Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3176-1 | clickhouse security update |
EUVD |
EUVD-2021-30247 | Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits. |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 25 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Clickhouse
Clickhouse clickhouse |
|
| CPEs | cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yandex
Yandex clickhouse |
Clickhouse
Clickhouse clickhouse |
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2024-08-04T03:55:28.381Z
Reserved: 2021-11-03T00:00:00.000Z
Link: CVE-2021-43304
No data.
Status : Modified
Published: 2022-03-14T23:15:08.157
Modified: 2025-06-25T20:49:29.357
Link: CVE-2021-43304
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD