Return-Path: X-Original-To: apmail-hadoop-general-archive@minotaur.apache.org Delivered-To: apmail-hadoop-general-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id B5EB991C8 for ; Fri, 6 Apr 2012 17:19:41 +0000 (UTC) Received: (qmail 57161 invoked by uid 500); 6 Apr 2012 17:19:40 -0000 Delivered-To: apmail-hadoop-general-archive@hadoop.apache.org Received: (qmail 57064 invoked by uid 500); 6 Apr 2012 17:19:40 -0000 Mailing-List: contact general-help@hadoop.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: general@hadoop.apache.org Delivered-To: mailing list general@hadoop.apache.org Received: (qmail 57056 invoked by uid 99); 6 Apr 2012 17:19:40 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 06 Apr 2012 17:19:40 +0000 X-ASF-Spam-Status: No, hits=0.7 required=5.0 tests=RCVD_IN_DNSWL_NONE,SPF_NEUTRAL X-Spam-Check-By: apache.org Received-SPF: neutral (athena.apache.org: local policy) Received: from [98.138.91.89] (HELO nm13-vm2.bullet.mail.ne1.yahoo.com) (98.138.91.89) by apache.org (qpsmtpd/0.29) with SMTP; Fri, 06 Apr 2012 17:19:33 +0000 Received: from [98.138.90.55] by nm13.bullet.mail.ne1.yahoo.com with NNFMP; 06 Apr 2012 17:19:12 -0000 Received: from [98.138.89.197] by tm8.bullet.mail.ne1.yahoo.com with NNFMP; 06 Apr 2012 17:19:12 -0000 Received: from [127.0.0.1] by omp1055.mail.ne1.yahoo.com with NNFMP; 06 Apr 2012 17:19:12 -0000 X-Yahoo-Newman-Property: ymail-3 X-Yahoo-Newman-Id: 775534.48262.bm@omp1055.mail.ne1.yahoo.com Received: (qmail 66457 invoked by uid 60001); 6 Apr 2012 17:19:11 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1333732751; bh=dFWga0tO1hEss3Xi2zOeAgJJQhlOmDG5xzaViXQzR4A=; h=X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=YoULhZ3G9YBc3IzFBsAIu9JdHHUNDttHfpbTVUzfYfM3gOXl65GV/gaQqlBsVg1JprQbYoEP6cTL1ojSS1UMA6uadSvPjoksweLtPVxD11creEBYW0Yt6lVOCW0197DekaQdMAzSrUpbvvCZ0PcukxLsRboPZI4dN0aY/S1CfAQ= X-YMail-OSG: RWBGEfYVM1kuzKZSmctkkwJPHkdn4PIdiEOgLYMBPa3DKoA NOB3ddyn1YnzdaP.4pwGqzv518d5xiQ.zkbGxqsO7cxjInfIBOFKjC.IPYyz .MtjaP9rGhe70_GHf6F4NnZlz2zHqc3gSbjVikYWwOfp8OjPCtk.Uay6PP3F gWqAMLUYXbEOddlIShr4AN8kH_WA1z0Ro9A6a8W9qF5vQm749KXviJRtjQMt vcfVxNUzVmqIQ8cunn2jV17MCsn7.lKfTjqTZWvRxQ1PBwBT8HFi3U2qToLZ yM8sNZ0HYFVrZKEc1tV6_NwgVD7S0NSgL8za4Lkl7ekz28Oo5tbcki7Al1nk 2XV2C3f9_wXix1JpFMUs6zyl4YZZTfjHPK9BG_FHhKwzLSCLJFQzfhfG7DTd wmelDH5lOh1Ku0DOu3pagtBY6umVj3ZWtD2wAX2PmpJ1ddOOb.UFOiPVBiA0 rVjeD5CFOwy6bLTZEE1go8u84xoavrIzPQwaIR2cjJr4aZMYobgWZQ5hx6xx Nb4TV3Y0UvGnI3d9MpblStm7PYLAOk5JTHET4WUoWjVY- Received: from [69.231.24.241] by web164501.mail.gq1.yahoo.com via HTTP; Fri, 06 Apr 2012 10:19:11 PDT X-RocketYMMF: apurtell X-Mailer: YahooMailWebService/0.8.117.340979 References: <1333731756.94265.YahooMailNeo@web164502.mail.gq1.yahoo.com> Message-ID: <1333732751.60003.YahooMailNeo@web164501.mail.gq1.yahoo.com> Date: Fri, 6 Apr 2012 10:19:11 -0700 (PDT) From: Andrew Purtell Reply-To: Andrew Purtell Subject: Re: [CVE-2012-1574] Apache Hadoop user impersonation vulnerability To: "general@hadoop.apache.org" , "security@apache.org" In-Reply-To: <1333731756.94265.YahooMailNeo@web164502.mail.gq1.yahoo.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: quoted-printable X-Virus-Checked: Checked by ClamAV on apache.org I received off list communication that the fix is here: https://github.com/= apache/hadoop-common/commit/fda454 =0A=0A=0AThank you, this is the missing = disclosure we were looking for. =0A=0A=0AI did not go so far back in time a= s >~ 21 days because the announcement was made today, so missed it. =0A=0A= =0ASo there is additional mitigation possible, for example, a user can patc= h task-controller quite readily and roll out an emergency upgrade.=0A=0A=0A= Best regards,=0A=0A=0A=A0 =A0 - Andy=0A=0AProblems worthy of attack prove t= heir worth by hitting back. - Piet Hein (via Tom White)=0A=0A=0A=0A----- Or= iginal Message -----=0A> From: Andrew Purtell =0A> To:= "general@hadoop.apache.org" ; "security@apache.= org" =0A> Cc: =0A> Sent: Friday, April 6, 2012 10:02 A= M=0A> Subject: Re: [CVE-2012-1574] Apache Hadoop user impersonation vulnera= bility=0A> =0A>T his is not a helpful disclosure.=0A> =0A> Now we know our = "secure" deployment is vulnerable, but have no idea =0A> how to mitigate. C= laiming an upgrade to a nonexistent version with an, =0A> apparently, uncom= mitted fix as a mitigation is not viable. Where is the JIRA for =0A> this? = =0A> =0A> Best regards,=0A> =0A> =0A> =A0 =A0 - Andy=0A> =0A> Problems wort= hy of attack prove their worth by hitting back. - Piet Hein (via =0A> Tom W= hite)=0A> =0A> =0A> =0A> ----- Original Message -----=0A>> From: Aaron T. = Myers =0A>> To: general@hadoop.apache.org; security@apac= he.org; =0A> full-disclosure@lists.grok.org.uk; bugtraq@securityfocus.com= =0A>> Cc: =0A>> Sent: Thursday, April 5, 2012 7:31 PM=0A>> Subject: [CVE= -2012-1574] Apache Hadoop user impersonation vulnerability=0A>> =0A>> Hell= o,=0A>> =0A>> Users of Apache Hadoop should be aware of a security vulnera= bility recently=0A>> discovered, as described by the following CVE. In par= ticular, please note=0A>> the "Users affected", "Versions affected", and = =0A>> "Mitigation" sections.=0A>> =0A>> Best,=0A>> Aaron=0A>> =0A>> --= =0A>> Aaron T. Myers=0A>> Software Engineer, Cloudera=0A>> =0A>> CVE-201= 2-1574: Apache Hadoop user impersonation vulnerability=0A>> =0A>> Severity= : Critical=0A>> =0A>> Vendor: The Apache Software Foundation=0A>> =0A>> V= ersions Affected:=0A>> Hadoop 0.20.203.0, 0.20.204.0, and 0.20.205.0=0A>> = Hadoop 1.0.0 to 1.0.1=0A>> Hadoop 0.23.0 to 0.23.1.=0A>> =0A>> Users aff= ected: Users who have enabled Hadoop's Kerberos/MapReduce =0A> security=0A>= > features.=0A>> =0A>> Impact: Vulnerability allows an authenticated mali= cious user to impersonate=0A>> any other user on the cluster.=0A>> =0A>> = Mitigation:=0A>> 0.20.20x.x and 1.0.x users should upgrade to 1.0.2=0A>> = 0.23.x users should upgrade to 0.23.2 when it becomes available=0A>> =0A>> = Credit:=0A>> This issue was discovered by Aaron T. Myers of Cloudera.=0A>= > =0A>