mirror of
https://github.com/ClickHouse/ClickHouse.git
synced 2024-11-27 10:02:01 +00:00
94f86eda79
* Some improvements for introduction/performance.md
* Minor improvements for example_datasets
* Add website/package-lock.json to .gitignore
* YT paragraph was badly outdated and there is no real reason to write a new one
* Use weird introduction article as a starting point for F.A.Q.
* Some refactoring of first half of ya_metrika_task.md
* minor
* Weird docs footer bugfix
* Forgotten redirect
* h/v scrollbars same size in docs
* CLICKHOUSE-3831: introduce security changelog
* A bit more narrow tables on docs front page
* fix flag in ru docs
* Save some space in top level of docs ToC
* Capitalize most words in titles of docs/en/
* more docs scrollbar fixes
* fix incorrect merge
* fix link
* fix switching languages in single page docs mode
* Update mkdocs & mkdocs-material + unminify javascript
* cherrypick 17e18d1ecc
22 lines
842 B
Markdown
22 lines
842 B
Markdown
## Fixed in ClickHouse Release 1.1.54388, 2018-06-28
|
|
|
|
### CVE-2018-14668
|
|
"remote" table function allowed arbitrary symbols in "user", "password" and "default_database" fields which led to Cross Protocol Request Forgery Attacks.
|
|
|
|
Credits: Andrey Krasichkov of Yandex Information Security Team
|
|
|
|
## Fixed in ClickHouse Release 1.1.54390, 2018-07-06
|
|
|
|
### CVE-2018-14669
|
|
ClickHouse MySQL client had "LOAD DATA LOCAL INFILE" functionality enabled that allowed a malicious MySQL database read arbitrary files from the connected ClickHouse server.
|
|
|
|
Credits: Andrey Krasichkov and Evgeny Sidorov of Yandex Information Security Team
|
|
|
|
## Fixed in ClickHouse Release 1.1.54131, 2017-01-10
|
|
|
|
### CVE-2018-14670
|
|
|
|
Incorrect configuration in deb package could lead to unauthorized use of the database.
|
|
|
|
Credits: the UK's National Cyber Security Centre (NCSC)
|