Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 278824 - net-zope/zodb net-zope/zope Execution of arbitrary code, Authentication Bypass (CVE-2009-0668,CVE-2009-0669)
Summary: net-zope/zodb net-zope/zope Execution of arbitrary code, Authentication Bypas...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL: http://mail.zope.org/pipermail/zope-a...
Whiteboard: B1 [noglsa]
Keywords:
: CVE-2009-0668 (view as bug list)
Depends on: 257545
Blocks:
  Show dependency tree
 
Reported: 2009-07-23 12:07 UTC by Robert Buchholz (RETIRED)
Modified: 2014-02-09 13:05 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
zodb-3.3.1-CVE-2009-0668+0669.patch (zodb-3.3.1-CVE-2009-0668+0669.patch,4.66 KB, patch)
2009-07-23 12:10 UTC, Robert Buchholz (RETIRED)
no flags Details | Diff
zodb-3.3.1.ebuild (zodb-3.3.1.ebuild,765 bytes, text/plain)
2009-07-27 12:00 UTC, Tupone Alfredo
no flags Details
CVE-2009-0668+0669.patch (CVE-2009-0668+0669.patch,4.20 KB, patch)
2009-07-28 14:29 UTC, Tupone Alfredo
no flags Details | Diff
zope-2.9.10.ebuild.patch (zope-2.9.10.ebuild.patch,1.00 KB, patch)
2009-07-28 14:30 UTC, Tupone Alfredo
no flags Details | Diff
zope-2.10.7.ebuild.patch (zope-2.10.7.ebuild.patch,1.07 KB, patch)
2009-07-28 14:30 UTC, Tupone Alfredo
no flags Details | Diff
bug278824overlay.tar.gz (bug278824overlay.tar.gz,18.25 KB, application/x-gzip)
2009-07-28 15:21 UTC, Robert Buchholz (RETIRED)
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2009-07-23 12:07:08 UTC
** Please note that this issue is confidential and no information should be
disclosed until it is made public, see "Whiteboard" for a date **

A vulnerability in the  Zope Object Database (ZODB) database server (ZEO) allows a client to execute arbitrary Python code in the server process (CVE-2009-0668).

ZEO includes a weak authentication protocol that allows authentication to be bypassed (CVE-2009-0669).
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2009-07-23 12:10:19 UTC
Radoslaw, Alfredo, please prepare an ebuild using the attached patch and attach the ebuild to this bug. We can do prestable testing here. Do not commit anything to CVS.
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2009-07-23 12:10:53 UTC
Created attachment 198895 [details, diff]
zodb-3.3.1-CVE-2009-0668+0669.patch
Comment 3 Tupone Alfredo gentoo-dev 2009-07-27 10:35:21 UTC
Well, I don't have a reference for the CVE, I guess for that is confidential, but I guess it affects other version of zodb, as the code in ZEO seems is not changed between those versions (from a very very short reading).
If that I guess even zope is affected as is using zodb from the zope omnicomprensive tar.
However is, I'm going to do what you required very soon.
Comment 4 Tupone Alfredo gentoo-dev 2009-07-27 12:00:14 UTC
Created attachment 199327 [details]
zodb-3.3.1.ebuild

The required updated ebuild.
Comment 5 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-07-27 13:10:50 UTC
Arch Security Liaisons, please test the attached ebuild and report it stable on this bug.
Target keywords: "amd64 x86"
Comment 6 Robert Buchholz (RETIRED) gentoo-dev 2009-07-27 19:54:14 UTC
Oh, I was not aware net-zope/zope ships a copy of this as well. Are you maintaining all the zope slots as well?
Comment 7 Tupone Alfredo gentoo-dev 2009-07-28 06:18:02 UTC
Well, yeah. If you can point the version affected I can see what I can do for those
Comment 8 Robert Buchholz (RETIRED) gentoo-dev 2009-07-28 10:50:49 UTC
2.8 and later is affected, Please attch ebuilds for the 2.9 and 2.10 slot to this bug, and we'll also test them.
Comment 9 Tupone Alfredo gentoo-dev 2009-07-28 14:29:50 UTC
Created attachment 199434 [details, diff]
CVE-2009-0668+0669.patch

Same as the attached patch. Different subtree. Used by zope ebuild
Comment 10 Tupone Alfredo gentoo-dev 2009-07-28 14:30:15 UTC
Created attachment 199435 [details, diff]
zope-2.9.10.ebuild.patch
Comment 11 Tupone Alfredo gentoo-dev 2009-07-28 14:30:35 UTC
Created attachment 199436 [details, diff]
zope-2.10.7.ebuild.patch
Comment 12 Tupone Alfredo gentoo-dev 2009-07-28 14:31:46 UTC
A question:
is zodb-3.6.0 not affected?
Comment 13 Robert Buchholz (RETIRED) gentoo-dev 2009-07-28 14:59:07 UTC
It is affected, please patch/update as soon as this bug is public. But we will not perform prestable testing on those versions as they are not stable.
Comment 14 Robert Buchholz (RETIRED) gentoo-dev 2009-07-28 15:21:29 UTC
Created attachment 199451 [details]
bug278824overlay.tar.gz

This is messy, I'm sorry. I just noticed that zodb-3.6 also has a stable version for x86. Also, the ebuilds are named exactly as the ones in tree without -r1.
I'm attaching the packed updates to the zope and zodb directories -- hopefully that makes it easier to test than yet another two files on the bug.

Arch Security Liaisons, these are for you:
=net-zope/zope-2.10.7-r1
=net-zope/zope-2.9.10-r1
Target keywords : "alpha amd64 ppc sparc x86"

=net-zope/zodb-3.3.1-r1
Target keywords : "amd64 x86"

=net-zope/zodb-3.6.0-r1
Target keywords : "x86"


CC'ing current Liaisons:
   alpha : armin76, klausman
   amd64 : keytoaster, tester
     ppc : josejx, ranger
   sparc : fmccor
     x86 : fauli, maekke
Comment 15 Tupone Alfredo gentoo-dev 2009-07-30 11:54:11 UTC
I will be out on August. Do what you need to do (like commit the change) when the CVE become public
Comment 16 Robert Buchholz (RETIRED) gentoo-dev 2009-08-09 00:25:37 UTC
This is now public. If anyone has the time, please commit as Tupone is currently away.
Comment 17 Robert Buchholz (RETIRED) gentoo-dev 2009-08-09 00:26:05 UTC
*** Bug 280822 has been marked as a duplicate of this bug. ***
Comment 18 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-08-17 10:32:14 UTC
+*zope-2.10.7-r1 (17 Aug 2009)
+*zope-2.9.10-r1 (17 Aug 2009)
+
+  17 Aug 2009; Alex Legler <a3li@gentoo.org> +zope-2.9.10-r1.ebuild,
+  +zope-2.10.7-r1.ebuild, +files/CVE-2009-0668+0669.patch:
+  Non-maintainer commit: Version bump for security bug 278824.
+

+*zodb-3.6.0-r1 (17 Aug 2009)
+*zodb-3.3.1-r1 (17 Aug 2009)
+
+  17 Aug 2009; Alex Legler <a3li@gentoo.org> +zodb-3.3.1-r1.ebuild,
+  +files/zodb-3.3.1-CVE-2009-0668+0669.patch, +zodb-3.6.0-r1.ebuild,
+  +files/zodb-3.6.0-CVE-2009-0668+0669.patch:
+  Non-mainatiner commit: Version bump for security bug 278824.
+

Arches, please stable according to comment 14.
Comment 19 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-08-17 10:33:46 UTC
Sorry for the spam, forgot to select "remove selected CCs"
Comment 20 Samuli Suominen (RETIRED) gentoo-dev 2009-08-17 13:22:15 UTC
There's bug 257545 that indicates this won't even work with Python 2.5, so I doubt there is any point in wasting time with this without maintainer (there's none) adding a new version in tree (Like zodb 3.7.x or 3.8.x)
Comment 21 Robert Buchholz (RETIRED) gentoo-dev 2009-08-17 13:36:51 UTC
(In reply to comment #20)
> There's bug 257545 that indicates this won't even work with Python 2.5, so I
> doubt there is any point in wasting time with this without maintainer (there's
> none) adding a new version in tree (Like zodb 3.7.x or 3.8.x)

If treecleaners will mask and remove zodb, we'll limit arch calling to zope only.
Comment 22 nixnut (RETIRED) gentoo-dev 2009-08-23 09:36:18 UTC
ppc stable
Comment 23 Christian Faulhammer (RETIRED) gentoo-dev 2009-08-25 11:54:26 UTC
x86 stable
Comment 24 Tobias Klausmann (RETIRED) gentoo-dev 2009-08-25 14:49:17 UTC
Both stable on alpha.
Comment 25 Raúl Porcel (RETIRED) gentoo-dev 2009-08-25 16:54:16 UTC
sparc stable
Comment 26 Markus Meier gentoo-dev 2009-09-11 19:12:39 UTC
amd64 stable, all arches done.
Comment 27 Stefan Behte (RETIRED) gentoo-dev Security 2009-11-07 00:36:47 UTC
GLSA request filed.
Comment 28 Tobias Heinlein (RETIRED) gentoo-dev 2014-02-09 13:05:22 UTC
No GLSA for webapps.