Upstream information

CVE-2014-9365 at MITRE

Description

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Note from the SUSE Security Team

We are currently not planning to backport this security feature, on fear of breaking a significant percentage of customer scenarios on local sites with invalid SSL certificates. Future service packs and products will have this feature enabled by default.

SUSE Bugzilla entry: 909713 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
Magnum Orchestration python Unsupported
Magnum Orchestration python-backports.ssl_match_hostname Already fixed
SUSE Container as a Service Platform 1.0 python Affected
SUSE Container as a Service Platform 1.0 python-backports.ssl_match_hostname Affected
SUSE Container as a Service Platform 2.0 python Unsupported
SUSE Container as a Service Platform 2.0 python-backports.ssl_match_hostname Already fixed
SUSE Enterprise Storage 3 python-backports.ssl_match_hostname Already fixed
SUSE Enterprise Storage 4 python-backports.ssl_match_hostname Already fixed
SUSE Enterprise Storage 5 python Unsupported
SUSE Enterprise Storage 5 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Desktop 12 SP2 python Affected
SUSE Linux Enterprise Desktop 12 SP2 python-backports.ssl_match_hostname Affected
SUSE Linux Enterprise Desktop 12 SP3 python Unsupported
SUSE Linux Enterprise Desktop 12 SP3 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Module for Advanced Systems Management 12 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Module for Containers 12 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Module for Public Cloud 12 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Server 11 SP3 LTSS python Unsupported
SUSE Linux Enterprise Server 11 SP4 python Unsupported
SUSE Linux Enterprise Server 12 SP1 LTSS python Unsupported
SUSE Linux Enterprise Server 12 SP2 python Unsupported
SUSE Linux Enterprise Server 12 SP3 python Unsupported
SUSE Linux Enterprise Software Development Kit 11 SP4 python Unsupported
SUSE Manager Client Tools for SLE 12 python-backports.ssl_match_hostname Already fixed
SUSE Manager Proxy 3.0 python-backports.ssl_match_hostname Already fixed
SUSE Manager Proxy 3.1 python-backports.ssl_match_hostname Already fixed
SUSE Manager Server 3.0 python-backports.ssl_match_hostname Already fixed
SUSE Manager Server 3.1 python-backports.ssl_match_hostname Already fixed
SUSE OpenStack Cloud 6 python-backports.ssl_match_hostname Already fixed
SUSE OpenStack Cloud 7 python-backports.ssl_match_hostname Already fixed