You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@mesos.apache.org by "Gavin (JIRA)" <ji...@apache.org> on 2019/04/29 09:27:25 UTC

[jira] [Issue Comment Deleted] (MESOS-6953) A compromised mesos-master node can execute code as root on agents.

     [ https://issues.apache.org/jira/browse/MESOS-6953?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Gavin updated MESOS-6953:
-------------------------
    Comment: was deleted

(was: www.rtat.net)

> A compromised mesos-master node can execute code as root on agents.
> -------------------------------------------------------------------
>
>                 Key: MESOS-6953
>                 URL: https://issues.apache.org/jira/browse/MESOS-6953
>             Project: Mesos
>          Issue Type: Bug
>          Components: security
>            Reporter: Anindya Sinha
>            Assignee: Anindya Sinha
>            Priority: Major
>              Labels: security, slave
>             Fix For: 1.3.0
>
>
> mesos-master has a `--[no-]root_submissions` flag that controls whether frameworks with `root` user are admitted to the cluster.
> However, if a mesos-master node is compromised, it can attempt to schedule tasks on agent as the `root` user. Since mesos-agent has no check against tasks running on the agent for specific users, tasks can get run with `root` privileges can get run within the container on the agent.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)