[ https://issues.apache.org/jira/browse/MESOS-6953?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Gavin updated MESOS-6953: ------------------------- Comment: was deleted (was: www.rtat.net) > A compromised mesos-master node can execute code as root on agents. > ------------------------------------------------------------------- > > Key: MESOS-6953 > URL: https://issues.apache.org/jira/browse/MESOS-6953 > Project: Mesos > Issue Type: Bug > Components: security > Reporter: Anindya Sinha > Assignee: Anindya Sinha > Priority: Major > Labels: security, slave > Fix For: 1.3.0 > > > mesos-master has a `--[no-]root_submissions` flag that controls whether > frameworks with `root` user are admitted to the cluster. > However, if a mesos-master node is compromised, it can attempt to schedule > tasks on agent as the `root` user. Since mesos-agent has no check against > tasks running on the agent for specific users, tasks can get run with `root` > privileges can get run within the container on the agent. -- This message was sent by Atlassian JIRA (v7.6.3#76005)