Debian Clickhouse vulnerabilities
17 known vulnerabilities affecting debian/clickhouse.
Total CVEs
17
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH7MEDIUM1LOW9
Vulnerabilities
Page 1 of 1
CVE-2025-1385LOWCVSS 7.52025
CVE-2025-1385 [HIGH] CVE-2025-1385: clickhouse - When the library bridge feature is enabled, the clickhouse-library-bridge expose...
When the library bridge feature is enabled, the clickhouse-library-bridge exposes an HTTP API on localhost. This allows clickhouse-server to dynamically load a library from a specified path and execute it in an isolated process. Combined with the ClickHouse table engine functionality that permits file uploads to specific directories, a misconfigured server can be e
debian
CVE-2024-41436HIGHCVSS 7.52024
CVE-2024-41436 [HIGH] CVE-2024-41436: clickhouse - ClickHouse v24.3.3.102 was discovered to contain a buffer overflow via the compo...
ClickHouse v24.3.3.102 was discovered to contain a buffer overflow via the component DB::evaluateConstantExpressionImpl.
Scope: local
bookworm: open
bullseye: open
debian
CVE-2024-22412LOWCVSS 2.42024
CVE-2024-22412 [LOW] CVE-2024-22412: clickhouse - ClickHouse is an open-source column-oriented database management system. A bug e...
ClickHouse is an open-source column-oriented database management system. A bug exists in the cloud ClickHouse offering prior to version 24.0.2.54535 and in github.com/clickhouse/clickhouse version 23.1. Query caching bypasses the role based access controls and the policies being enforced on roles. In affected versions, the query cache only respects separate users,
debian
CVE-2024-6873LOWCVSS 8.12024
CVE-2024-6873 [HIGH] CVE-2024-6873: clickhouse - It is possible to crash or redirect the execution flow of the ClickHouse server ...
It is possible to crash or redirect the execution flow of the ClickHouse server process from an unauthenticated vector by sending a specially crafted request to the ClickHouse server native interface. This redirection is limited to what is available within a 256-byte range of memory at the time of execution, and no known remote code execution (RCE) code has been pr
debian
CVE-2023-48704LOWCVSS 7.02023
CVE-2023-48704 [HIGH] CVE-2023-48704: clickhouse - ClickHouse is an open-source column-oriented database management system that all...
ClickHouse is an open-source column-oriented database management system that allows generating analytical data reports in real-time. A heap buffer overflow issue was discovered in ClickHouse server. An attacker could send a specially crafted payload to the native interface exposed by default on port 9000/tcp, triggering a bug in the decompression logic of Gorilla
debian
CVE-2023-48298LOWCVSS 7.02023
CVE-2023-48298 [HIGH] CVE-2023-48298: clickhouse - ClickHouse® is an open-source column-oriented database management system that al...
ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. This vulnerability is an integer underflow resulting in crash due to stack buffer overflow in decompression of FPC codec. It can be triggered and exploited by an unauthenticated attacker. The vulnerability is very similar to CVE-20
debian
CVE-2023-47118LOWCVSS 7.02023
CVE-2023-47118 [HIGH] CVE-2023-47118: clickhouse - ClickHouse® is an open-source column-oriented database management system that al...
ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. A heap buffer overflow issue was discovered in ClickHouse server. An attacker could send a specially crafted payload to the native interface exposed by default on port 9000/tcp, triggering a bug in the decompression logic of T64 co
debian
CVE-2022-44010HIGHCVSS 7.52022
CVE-2022-44010 [HIGH] CVE-2022-44010: clickhouse - An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send...
An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send a crafted HTTP request to the HTTP Endpoint (usually listening on port 8123 by default), causing a heap-based buffer overflow that crashes the process. This does not require authentication. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19.
Scope: lo
debian
CVE-2022-44011MEDIUMCVSS 6.52022
CVE-2022-44011 [MEDIUM] CVE-2022-44011: clickhouse - An issue was discovered in ClickHouse before 22.9.1.2603. An authenticated user ...
An issue was discovered in ClickHouse before 22.9.1.2603. An authenticated user (with the ability to load data) could cause a heap buffer overflow and crash the server by inserting a malformed CapnProto object. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19.
Scope: local
bookworm: open
bullseye: open
debian
CVE-2021-43305HIGHCVSS 8.8fixed in clickhouse 18.16.1+ds-7.3 (bookworm)2021
CVE-2021-43305 [HIGH] CVE-2021-43305: clickhouse - Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malici...
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy(op, ip, copy_end), don’t exceed the destination buffer’s limits. This issue is very similar to CVE-2021-43304, but the vulnerable copy oper
debian
CVE-2021-43304HIGHCVSS 8.8fixed in clickhouse 18.16.1+ds-7.3 (bookworm)2021
CVE-2021-43304 [HIGH] CVE-2021-43304: clickhouse - Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malici...
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy(op, ip, copy_end), don’t exceed the destination buffer’s limits.
Scope: local
bookworm: resolved (fixed in 18.16.1+ds-7.3)
bullseye: resolv
debian
CVE-2021-42387HIGHCVSS 8.1fixed in clickhouse 18.16.1+ds-7.3 (bookworm)2021
CVE-2021-42387 [HIGH] CVE-2021-42387: clickhouse - Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a mal...
Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As part of the LZ4::decompressImpl() loop, a 16-bit unsigned user-supplied value ('offset') is read from the compressed data. The offset is later used in the length of a copy operation, without checking the upper bounds of the source of the copy operation.
Scope: local
b
debian
CVE-2021-42388HIGHCVSS 8.1fixed in clickhouse 18.16.1+ds-7.3 (bookworm)2021
CVE-2021-42388 [HIGH] CVE-2021-42388: clickhouse - Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a mal...
Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As part of the LZ4::decompressImpl() loop, a 16-bit unsigned user-supplied value ('offset') is read from the compressed data. The offset is later used in the length of a copy operation, without checking the lower bounds of the source of the copy operation.
Scope: local
b
debian
CVE-2021-42390LOWCVSS 6.52021
CVE-2021-42390 [MEDIUM] CVE-2021-42390: clickhouse - Divide-by-zero in Clickhouse's DeltaDouble compression codec when parsing a mali...
Divide-by-zero in Clickhouse's DeltaDouble compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0.
Scope: local
bookworm: resolved
bullseye: resolved
debian
CVE-2021-42391LOWCVSS 6.52021
CVE-2021-42391 [MEDIUM] CVE-2021-42391: clickhouse - Divide-by-zero in Clickhouse's Gorilla compression codec when parsing a maliciou...
Divide-by-zero in Clickhouse's Gorilla compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0.
Scope: local
bookworm: resolved
bullseye: resolved
debian
CVE-2021-42389LOWCVSS 6.52021
CVE-2021-42389 [MEDIUM] CVE-2021-42389: clickhouse - Divide-by-zero in Clickhouse's Delta compression codec when parsing a malicious ...
Divide-by-zero in Clickhouse's Delta compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0.
Scope: local
bookworm: resolved
bullseye: resolved
debian
CVE-2019-16536HIGHCVSS 8.22019
CVE-2019-16536 [HIGH] CVE-2019-16536: clickhouse - Stack overflow leading to DoS can be triggered by a malicious authenticated clie...
Stack overflow leading to DoS can be triggered by a malicious authenticated client in Clickhouse before 19.14.3.3.
Scope: local
bookworm: open
bullseye: open
debian