You are viewing a plain text version of this content. The canonical link for it is here.
Posted to yarn-dev@hadoop.apache.org by "Remus Rusanu (JIRA)" <ji...@apache.org> on 2014/09/15 15:33:35 UTC

[jira] [Created] (YARN-2552) Windows Secure Container Executor: the privileged file operations of hadoopwinutilsvc should be constrained to localdirs only

Remus Rusanu created YARN-2552:
----------------------------------

             Summary: Windows Secure Container Executor: the privileged file operations of hadoopwinutilsvc should be constrained to localdirs only
                 Key: YARN-2552
                 URL: https://issues.apache.org/jira/browse/YARN-2552
             Project: Hadoop YARN
          Issue Type: Sub-task
          Components: nodemanager
            Reporter: Remus Rusanu
            Assignee: Remus Rusanu


YARN-2458 added file manipulation operations executed in an elevated context by hadoopwinutilsvc. W/o any constraint, the NM (or a hijacker that takes over the NM) can manipulate arbitrary OS files under highest possible privileges, an easy elevation attack vector. The service should only allow operations on files/directories that are under the configured NM localdirs. It should read this value from wsce-site.xml, as the yarn-site.xml cannot be trusted, being writable by Hadoop admins (YARN-2551 ensures wsce-site.xml is only writable by system Administrators, not Hadoop admins).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)