Mutagen Astronomy - Local privilege escalation - CVE-2018-14634

Public Date:
Updated -
Status
Ongoing
Impact
Important

Red Hat has been made aware of  privilege escalation flaw in the Linux kernel regarding elf page table code.

Background information

Mutagen Astronomy is the codename for a local user privilege escalation flaw. Setuid binaries usually sanitize or clear environment variables which can be used to override built-in functions with attacker-controlled functions at runtime. However, this system-logic flaw allows process arguments to overwrite system environment variables. By hijacking these functions, an attacker can execute their own code, take control of the setuid binary, and execute commands at the elevated privilege level.

For a system to be vulnerable to this flaw, it must have:

  • More than 16GB of ram.
  • A 64-bit kernel.


Acknowledgements

Red Hat would like to thank Qualys  for reporting these flaws.

Additional References

Qualys advisory https://www.qualys.com/2018/09/25/cve-2018-14634/mutagen-astronomy-integer-overflow-linux-create_elf_tables-cve-2018-14634.txt

Red Hat Bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634

Impacted Products

  • Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt)
  • Red Hat Enterprise Linux 7 (kernel)
  • Red Hat Enterprise MRG 2
  • Red Hat Enterprise Linux 7
  • Red Hat Enterprise Linux 6

Currently, there are no known flaw reproducers for Red Hat Enterprise Linux 5.

Red Hat customers running affected versions of the Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the appropriate updates immediately.

Updates for Affected Products


ProductPackageAdvisory/Update
Red Hat Enterprise Linux 6kernelRHSA-2018:2846
Red Hat Enterprise Linux for Real Time 7kernel-rtRHSA-2018:2763
Red Hat Enterprise Linux 7kernel
RHSA-2018:2748


Mitigation

The flaw can be mitigated by reducing the hard stack limit usable by all users in the system. You can do so by modifying the system-wide limits and restarting the system. One adverse side effect is that limiting the stack may crash some large-stack programs. Fortunately, it is uncommon that an application hits this limit.

vi /etc/limits.conf

* hard stack 30720


A SystemTap script provided in BZ#1624498 does mitigate the provided exploit, but changing the limits system wide is a more comprehensive solution.


Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.