You are viewing a plain text version of this content. The canonical link for it is here.
Posted to yarn-dev@hadoop.apache.org by "Remus Rusanu (JIRA)" <ji...@apache.org> on 2014/09/18 13:36:33 UTC
[jira] [Resolved] (YARN-2552) Windows Secure Container Executor:
the privileged file operations of hadoopwinutilsvc should be constrained to
localdirs only
[ https://issues.apache.org/jira/browse/YARN-2552?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Remus Rusanu resolved YARN-2552.
--------------------------------
Resolution: Implemented
Fix is included in YARN-2198.delta.7.patch
> Windows Secure Container Executor: the privileged file operations of hadoopwinutilsvc should be constrained to localdirs only
> -----------------------------------------------------------------------------------------------------------------------------
>
> Key: YARN-2552
> URL: https://issues.apache.org/jira/browse/YARN-2552
> Project: Hadoop YARN
> Issue Type: Sub-task
> Components: nodemanager
> Reporter: Remus Rusanu
> Assignee: Remus Rusanu
> Labels: security, windows, wsce
> Attachments: YARN-2552.1.patch
>
>
> YARN-2458 added file manipulation operations executed in an elevated context by hadoopwinutilsvc. W/o any constraint, the NM (or a hijacker that takes over the NM) can manipulate arbitrary OS files under highest possible privileges, an easy elevation attack vector. The service should only allow operations on files/directories that are under the configured NM localdirs. It should read this value from wsce-site.xml, as the yarn-site.xml cannot be trusted, being writable by Hadoop admins (YARN-2551 ensures wsce-site.xml is only writable by system Administrators, not Hadoop admins).
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)