UbuntuUpdates.org

Package "clickhouse-client"

Name: clickhouse-client

Description:

column-oriented database system (cli client)

Latest version: 18.16.1+ds-7ubuntu0.1
Release: focal (20.04)
Level: security
Repository: universe
Head package: clickhouse
Homepage: https://clickhouse.yandex/

Links


Download "clickhouse-client"


Other versions of "clickhouse-client" in Focal

Repository Area Version
base universe 18.16.1+ds-7
updates universe 18.16.1+ds-7ubuntu0.1

Changelog

Version: 18.16.1+ds-7ubuntu0.1 2024-08-01 04:06:57 UTC

  clickhouse (18.16.1+ds-7ubuntu0.1) focal-security; urgency=medium

  * SECURITY UPDATE: heap out-of-bound read
    - debian/patches/CVE-2021-4238x-and-4330x.patch: better code around
      decompression
    - CVE-2021-42387
    - CVE-2021-42388
  * SECURITY UPDATE: heap buffer overflow
    - debian/patches/CVE-2021-4238x-and-4330x.patch: better code around
      decompression
    - CVE-2021-43304
    - CVE-2021-43305

 -- Shishir Subedi <email address hidden> Tue, 30 Jul 2024 08:19:51 +0545

CVE-2021-4238 Randomly-generated alphanumeric strings contain significantly less entropy than expected. The RandomAlphaNumeric and CryptoRandomAlphaNumeric functio
CVE-2021-42387 Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As part of the LZ4::decompressImpl() loop, a 16-bit uns
CVE-2021-42388 Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As part of the LZ4::decompressImpl() loop, a 16-bit uns
CVE-2021-43304 Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the L
CVE-2021-43305 Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the L



About   -   Send Feedback to @ubuntu_updates