SB2026011329 - clickhouse-java update for third-party components



SB2026011329 - clickhouse-java update for third-party components

Published: January 13, 2026

Security Bulletin ID SB2026011329
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2025-66566)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the application insufficiently clears the output buffer in Java-based decompressor implementations. In applications where the output buffer is reused without being cleared, this may lead to disclosure of sensitive data.

Note, JNI-based implementations are not affected.


2) Uncontrolled Recursion (CVE-ID: CVE-2025-48924)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop. A remote attacker can trigger uncontrolled recursion and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.