Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4A2FDA56-491B-4C2A-915F-C9D4A4BDB92A@apache.org>
Date: Fri, 02 Jun 2017 11:10:55 +0530
From: Varun Vasudev <vvasudev@...che.org>
To: <general@...oop.apache.org>,
	user <user@...oop.apache.org>,
	"<security@...oop.apache.org>" <security@...oop.apache.org>,
	security <security@...che.org>,
	<bugtraq@...urityfocus.com>,
	<oss-security@...ts.openwall.com>
Subject: CVE-2017-7669: Apache Hadoop privilege escalation

CVE-2017-7669: Apache Hadoop privilege escalation

Severity: Critical

Vendor: The Apache Software Foundation

Versions affected: Hadoop 2.8.0, Hadoop 3.0.0-alpha1 and Hadoop 3.0.0-alpha2

Description:
The LinuxContainerExecutor runs docker commands as root with
insufficient input validation. When the docker feature is enabled,
authenticated users can run commands as root

Mitigation:
Users of Apache Hadoop 2.8.0 should leave Docker functionality disabled until Hadoop 2.8.1 is released.
Users of Apache Hadoop 3.0.0-alpha1 and Hadoop 3.0.0-alpha2 should upgrade to Hadoop 3.0.0-alpha3 or later.

Credit:
This issue was discovered by Allen Wittenauer.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.