You are viewing a plain text version of this content. The canonical link for it is here.
Posted to yarn-dev@hadoop.apache.org by "Remus Rusanu (JIRA)" <ji...@apache.org> on 2014/09/18 13:36:33 UTC

[jira] [Resolved] (YARN-2552) Windows Secure Container Executor: the privileged file operations of hadoopwinutilsvc should be constrained to localdirs only

     [ https://issues.apache.org/jira/browse/YARN-2552?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Remus Rusanu resolved YARN-2552.
--------------------------------
    Resolution: Implemented

Fix is included in YARN-2198.delta.7.patch

> Windows Secure Container Executor: the privileged file operations of hadoopwinutilsvc should be constrained to localdirs only
> -----------------------------------------------------------------------------------------------------------------------------
>
>                 Key: YARN-2552
>                 URL: https://issues.apache.org/jira/browse/YARN-2552
>             Project: Hadoop YARN
>          Issue Type: Sub-task
>          Components: nodemanager
>            Reporter: Remus Rusanu
>            Assignee: Remus Rusanu
>              Labels: security, windows, wsce
>         Attachments: YARN-2552.1.patch
>
>
> YARN-2458 added file manipulation operations executed in an elevated context by hadoopwinutilsvc. W/o any constraint, the NM (or a hijacker that takes over the NM) can manipulate arbitrary OS files under highest possible privileges, an easy elevation attack vector. The service should only allow operations on files/directories that are under the configured NM localdirs. It should read this value from wsce-site.xml, as the yarn-site.xml cannot be trusted, being writable by Hadoop admins (YARN-2551 ensures wsce-site.xml is only writable by system Administrators, not Hadoop admins).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)