Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3176-1 | clickhouse security update |
EUVD |
EUVD-2021-30248 | Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits. This issue is very similar to CVE-2021-43304, but the vulnerable copy operation is in a different wildCopy call. |
Ubuntu USN |
USN-6933-1 | ClickHouse vulnerabilities |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 25 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Clickhouse
Clickhouse clickhouse |
|
| CPEs | cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yandex
Yandex clickhouse |
Clickhouse
Clickhouse clickhouse |
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2024-08-04T03:55:29.085Z
Reserved: 2021-11-03T00:00:00.000Z
Link: CVE-2021-43305
No data.
Status : Modified
Published: 2022-03-14T23:15:08.203
Modified: 2025-06-25T20:49:29.357
Link: CVE-2021-43305
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN