You are viewing a plain text version of this content. The canonical link for it is here.
Posted to mapreduce-dev@hadoop.apache.org by "Todd Lipcon (JIRA)" <ji...@apache.org> on 2010/09/28 21:48:33 UTC
[jira] Created: (MAPREDUCE-2096) Secure local filesystem IO from
symlink vulnerabilities
Secure local filesystem IO from symlink vulnerabilities
-------------------------------------------------------
Key: MAPREDUCE-2096
URL: https://issues.apache.org/jira/browse/MAPREDUCE-2096
Project: Hadoop Map/Reduce
Issue Type: Bug
Components: jobtracker, security, tasktracker
Affects Versions: 0.22.0
Reporter: Todd Lipcon
Assignee: Todd Lipcon
Priority: Blocker
This JIRA is to contribute a patch developed on the private security@ mailing list.
The vulnerability is that MR daemons occasionally open files that are located in a path where the user has write access. A malicious user may place a symlink in place of the expected file in order to cause the daemon to instead read another file on the system -- one which the attacker may not naturally be able to access. This includes delegation tokens belong to other users, log files, keytabs, etc.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.