Luci is a web-based high availability administration application. A flaw was found in the way the luci service was initialized. If a system administrator started the luci service from a directory that was writable to by a local user, that user could use this flaw to execute arbitrary code as the root or luci user. (CVE-2013-4482) A flaw was found in the way luci generated its configuration file. The file was created as world readable for a short period of time, allowing a local user to gain access to the authentication secrets stored in the configuration file. (CVE-2013-4481) These issues were discovered by Jan PokornΒ½ of Red Hat. These updated luci packages include numerous bug fixes and two enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.5 Technical Notes, linked to in the References, for information on the most significant of these changes. All luci users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements. After installing this update, the luci service will be restarted automatically.
rhn.redhat.com/errata/RHSA-2013-1603.html
access.redhat.com/security/updates/classification/#moderate
access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.5_Technical_Notes/luci.html#RHSA-2013-1603
bugzilla.redhat.com/show_bug.cgi?id=1001835
bugzilla.redhat.com/show_bug.cgi?id=1001836
bugzilla.redhat.com/show_bug.cgi?id=878149
bugzilla.redhat.com/show_bug.cgi?id=880363
bugzilla.redhat.com/show_bug.cgi?id=883008
bugzilla.redhat.com/show_bug.cgi?id=886517
bugzilla.redhat.com/show_bug.cgi?id=886576
bugzilla.redhat.com/show_bug.cgi?id=917747
bugzilla.redhat.com/show_bug.cgi?id=990321
rhn.redhat.com/errata/RHSA-2013-1603.html