This is an automated email from the ASF dual-hosted git repository.

iwasakims pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/hadoop-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 53f231de83 Add CVE-2023-26031 description
53f231de83 is described below

commit 53f231de83603b4c3034a941bd19113925bbe413
Author: Masatake Iwasaki <iwasak...@apache.org>
AuthorDate: Thu Nov 16 14:12:14 2023 +0900

    Add CVE-2023-26031 description
---
 content/cve_list.html | 28 ++++++++++++++++++++++++++++
 content/index.html    |  2 +-
 content/index.xml     |  2 +-
 src/cve_list.md       | 51 +++++++++++++++++++++++++++++++++++++++++++++++++++
 4 files changed, 81 insertions(+), 2 deletions(-)

diff --git a/content/cve_list.html b/content/cve_list.html
index 852bcd6ef1..802ccd9855 100644
--- a/content/cve_list.html
+++ b/content/cve_list.html
@@ -171,6 +171,34 @@ One paragraph summary goes here. Don't need nuts-and-bolts 
detail, just enough f
 - **Reported Date**:
 - **Issue Announced**:
 -->
+<h2 
id="cve-2023-26031httpcvemitreorgcgi-bincvenamecginamecve-2023-26031-privilege-escalation-in-apache-haoop-yarn-container-executor-binary-on-linux-systems"><a
 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26031";>CVE-2023-26031</a>
 Privilege escalation in Apache Haoop Yarn container-executor binary on Linux 
systems</h2>
+<p>Relative library resolution in linux container-executor binary in Apache 
Hadoop 3.3.1-3.3.4 on Linux allows local user to gain root privileges. If the 
YARN cluster is accepting work from remote (authenticated) users, this MAY 
permit remote users to gain root privileges.</p>
+<p>Hadoop 3.3.0 updated the <a 
href="https://hadoop.apache.org/docs/stable/hadoop-yarn/hadoop-yarn-site/SecureContainer.html";>YARN
 Secure Containers</a> to add a feature for executing user-submitted 
applications in isolated linux containers.</p>
+<p>The native binary HADOOP_HOME/bin/container-executor is used to launch 
these containers; it must be owned by root and have the suid bit set in order 
for the YARN processes to run the containers as the specific users submitting 
the jobs.</p>
+<p>The patch <a 
href="https://issues.apache.org/jira/browse/YARN-10495";>YARN-10495</a> 
&ldquo;make the rpath of container-executor configurable&rdquo; modified the 
library loading path for loading .so files from <code>$ORIGIN/</code> to 
<code>$ORIGIN/:../lib/native/</code>. This is the a path through which 
libcrypto.so is located. Thus it is is possible for a user with reduced 
privileges to install a malicious libcrypto library into a path to which they 
have write access, invoke the cont [...]
+If the YARN cluster is accepting work from remote (authenticated) users, and 
these users&rsquo; submitted job are executed in the physical host, rather than 
a container, then the CVE permits remote users to gain root privileges.</p>
+<p>The fix for the vulnerability is to revert the change, which is done in <a 
href="https://issues.apache.org/jira/browse/YARN-11441";>YARN-11441</a>, 
&ldquo;Revert YARN-10495&rdquo;. This patch is in hadoop-3.3.5.</p>
+<p>To determine whether a version of container-executor is vulnerable, use the 
readelf command. If the RUNPATH or RPATH value contains the relative path 
<code>./lib/native/</code> then it  is at risk</p>
+<pre tabindex="0"><code>$ readelf -d container-executor|grep 
&#39;RUNPATH\|RPATH&#39;
+0x000000000000001d (RUNPATH)            Library runpath: 
[$ORIGIN/:../lib/native/]
+</code></pre><p>If it does not, then it is safe:</p>
+<pre tabindex="0"><code>$ readelf -d container-executor|grep 
&#39;RUNPATH\|RPATH&#39;
+0x000000000000001d (RUNPATH)            Library runpath: [$ORIGIN/]
+</code></pre><p>For an at-risk version of container-executor to enable 
privilege escalation, the owner must be root and the suid bit must be set</p>
+<pre tabindex="0"><code>$ ls -laF /opt/hadoop/bin/container-executor
+---Sr-s---. 1 root hadoop 802968 May 9 20:21 /opt/hadoop/bin/container-executor
+</code></pre><p>A safe installation lacks the suid bit; ideally is also not 
owned by root.</p>
+<pre tabindex="0"><code>$ ls -laF /opt/hadoop/bin/container-executor
+-rwxr-xr-x. 1 yarn hadoop 802968 May 9 20:21 /opt/hadoop/bin/container-executor
+</code></pre><p>This configuration does not support Yarn Secure Containers, 
but all other hadoop services, including YARN job execution outside secure 
containers continue to work.</p>
+<ul>
+<li><strong>Versions affected</strong>: 3.3.1 to 3.3.4</li>
+<li><strong>Fixed versions</strong>: 3.3.5</li>
+<li><strong>Impact</strong>: privilege escalation</li>
+<li><strong>Reporter</strong>: Esa Hiltunen, Mikko Kortelainen</li>
+<li><strong>Reported Date</strong>: 2022/07/13</li>
+<li><strong>Issue Announced</strong>: 2023/11/16 (<a 
href="https://lists.apache.org/thread/q9qpdlv952gb4kphpndd5phvl7fkh71r";>general@hadoop</a>)</li>
+</ul>
 <h2 
id="cve-2021-25642httpcvemitreorgcgi-bincvenamecginamecve-2021-25642-apache-hadoop-yarn-remote-code-execution-in-zkconfigurationstore-of-capacity-scheduler"><a
 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25642";>CVE-2021-25642</a>
 Apache Hadoop YARN remote code execution in ZKConfigurationStore of capacity 
scheduler</h2>
 <p>ZKConfigurationStore which is optionally used by CapacityScheduler of
 Apache Hadoop YARN deserializes data obtained from ZooKeeper without
diff --git a/content/index.html b/content/index.html
index 6ef5783533..d03373ce67 100644
--- a/content/index.html
+++ b/content/index.html
@@ -3,7 +3,7 @@
 <!DOCTYPE html>
 <html lang="en">
   <head>
-       <meta name="generator" content="Hugo 0.108.0">
+       <meta name="generator" content="Hugo 0.111.3">
     <meta charset="utf-8">
     <meta http-equiv="X-UA-Compatible" content="IE=edge">
     <meta name="viewport" content="width=device-width, initial-scale=1">
diff --git a/content/index.xml b/content/index.xml
index 2995a199c6..822aa9e6a9 100644
--- a/content/index.xml
+++ b/content/index.xml
@@ -1436,7 +1436,7 @@ The Apache Hadoop software library is a framework that 
allows for the distribute
       <guid>https://hadoop.apache.org/cve_list.html</guid>
       <description>This page lists security fixes that the Hadoop PMC felt 
warranted a CVE. If you think something is missing from this list or if you 
think the set of impacted or fixed versions is incomplete then please ask on 
the Security list.
 CVEs are presented in most-recent-first order of announcement.
-CVE-2021-25642 Apache Hadoop YARN remote code execution in 
ZKConfigurationStore of capacity scheduler ZKConfigurationStore which is 
optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data 
obtained from ZooKeeper without validation.</description>
+CVE-2023-26031 Privilege escalation in Apache Haoop Yarn container-executor 
binary on Linux systems Relative library resolution in linux container-executor 
binary in Apache Hadoop 3.</description>
     </item>
     
     <item>
diff --git a/src/cve_list.md b/src/cve_list.md
index be08758987..5b85406df9 100644
--- a/src/cve_list.md
+++ b/src/cve_list.md
@@ -37,6 +37,57 @@ One paragraph summary goes here. Don't need nuts-and-bolts 
detail, just enough f
 - **Issue Announced**:
 -->
 
+## 
[CVE-2023-26031](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26031) 
Privilege escalation in Apache Haoop Yarn container-executor binary on Linux 
systems
+
+Relative library resolution in linux container-executor binary in Apache 
Hadoop 3.3.1-3.3.4 on Linux allows local user to gain root privileges. If the 
YARN cluster is accepting work from remote (authenticated) users, this MAY 
permit remote users to gain root privileges.
+
+Hadoop 3.3.0 updated the [YARN Secure 
Containers](https://hadoop.apache.org/docs/stable/hadoop-yarn/hadoop-yarn-site/SecureContainer.html)
 to add a feature for executing user-submitted applications in isolated linux 
containers.
+
+The native binary HADOOP_HOME/bin/container-executor is used to launch these 
containers; it must be owned by root and have the suid bit set in order for the 
YARN processes to run the containers as the specific users submitting the jobs.
+
+The patch [YARN-10495](https://issues.apache.org/jira/browse/YARN-10495) "make 
the rpath of container-executor configurable" modified the library loading path 
for loading .so files from `$ORIGIN/` to `$ORIGIN/:../lib/native/`. This is the 
a path through which libcrypto.so is located. Thus it is is possible for a user 
with reduced privileges to install a malicious libcrypto library into a path to 
which they have write access, invoke the container-executor command, and have 
their modified  [...]
+If the YARN cluster is accepting work from remote (authenticated) users, and 
these users' submitted job are executed in the physical host, rather than a 
container, then the CVE permits remote users to gain root privileges.
+
+The fix for the vulnerability is to revert the change, which is done in 
[YARN-11441](https://issues.apache.org/jira/browse/YARN-11441), "Revert 
YARN-10495". This patch is in hadoop-3.3.5.
+
+To determine whether a version of container-executor is vulnerable, use the 
readelf command. If the RUNPATH or RPATH value contains the relative path 
`./lib/native/` then it  is at risk
+
+```
+$ readelf -d container-executor|grep 'RUNPATH\|RPATH'
+0x000000000000001d (RUNPATH)            Library runpath: 
[$ORIGIN/:../lib/native/]
+```
+
+If it does not, then it is safe:
+
+```
+$ readelf -d container-executor|grep 'RUNPATH\|RPATH'
+0x000000000000001d (RUNPATH)            Library runpath: [$ORIGIN/]
+```
+
+For an at-risk version of container-executor to enable privilege escalation, 
the owner must be root and the suid bit must be set
+
+```
+$ ls -laF /opt/hadoop/bin/container-executor
+---Sr-s---. 1 root hadoop 802968 May 9 20:21 /opt/hadoop/bin/container-executor
+```
+
+A safe installation lacks the suid bit; ideally is also not owned by root.
+
+```
+$ ls -laF /opt/hadoop/bin/container-executor
+-rwxr-xr-x. 1 yarn hadoop 802968 May 9 20:21 /opt/hadoop/bin/container-executor
+
+```
+
+This configuration does not support Yarn Secure Containers, but all other 
hadoop services, including YARN job execution outside secure containers 
continue to work.
+
+- **Versions affected**: 3.3.1 to 3.3.4
+- **Fixed versions**: 3.3.5
+- **Impact**: privilege escalation
+- **Reporter**: Esa Hiltunen, Mikko Kortelainen
+- **Reported Date**: 2022/07/13
+- **Issue Announced**: 2023/11/16 
([general@hadoop](https://lists.apache.org/thread/q9qpdlv952gb4kphpndd5phvl7fkh71r))
+
 ## 
[CVE-2021-25642](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25642) 
Apache Hadoop YARN remote code execution in ZKConfigurationStore of capacity 
scheduler
 
 ZKConfigurationStore which is optionally used by CapacityScheduler of


---------------------------------------------------------------------
To unsubscribe, e-mail: common-commits-unsubscr...@hadoop.apache.org
For additional commands, e-mail: common-commits-h...@hadoop.apache.org

Reply via email to