Details
-
Bug
-
Status: Resolved
-
Major
-
Resolution: Fixed
-
0.22.0
-
None
-
Reviewed
Description
The linux-task-controller executable currently traverses a directory heirarchy and calls chown/chmod on the files inside. There is a race condition here which can be exploited by an attacker, causing the task-controller to improprly chown an arbitrary target file (via a symlink) to the user running a MR job. This can be exploited to escalate to root.
[this issue was raised and discussed on the security@ list over the last couple of months]
Attachments
Attachments
Issue Links
- blocks
-
MAPREDUCE-2376 test-task-controller fails if run as a userid < 1000
- Open
-
MAPREDUCE-2266 JvmManager sleeps between SIGTERM and SIGKILL while holding many TT locks
- Resolved
-
MAPREDUCE-2371 TaskLogsTruncater does not need to check log ownership when running as Child
- Resolved
- incorporates
-
MAPREDUCE-2242 LinuxTaskController doesn't properly escape environment variables
- Open
- is blocked by
-
HADOOP-7338 LocalDirAllocator improvements for MR-2178
- Resolved
- is depended upon by
-
MAPREDUCE-2373 When tasks exit with a nonzero exit status, task runner should log the stderr as well as stdout
- Open
-
HADOOP-8357 Restore security in Hadoop 0.22 branch
- Resolved