Upstream information

CVE-2014-9365 at MITRE

Description

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Note from the SUSE Security Team

We are currently not planning to backport this security feature, on fear of breaking a significant percentage of customer scenarios on local sites with invalid SSL certificates. Future service packs and products will have this feature enabled by default.

SUSE Bugzilla entries: 909713 [RESOLVED / FIXED], 930802 [RESOLVED]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
Magnum Orchestration python Unsupported
Magnum Orchestration python-backports.ssl_match_hostname Already fixed
SUSE Container as a Service Platform 1.0 python Affected
SUSE Container as a Service Platform 1.0 python-backports.ssl_match_hostname Affected
SUSE Container as a Service Platform 2.0 python Unsupported
SUSE Container as a Service Platform 2.0 python-backports.ssl_match_hostname Already fixed
SUSE Enterprise Storage 3 python-backports.ssl_match_hostname Already fixed
SUSE Enterprise Storage 4 python-backports.ssl_match_hostname Already fixed
SUSE Enterprise Storage 5 python Unsupported
SUSE Enterprise Storage 5 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise 12 Module for Advanced Systems Management python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise 12 Module for Containers python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise 12 Module for Public Cloud python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Desktop 12 SP2 python Affected
SUSE Linux Enterprise Desktop 12 SP2 python-backports.ssl_match_hostname Affected
SUSE Linux Enterprise Desktop 12 SP3 python Unsupported
SUSE Linux Enterprise Desktop 12 SP3 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Server 11 SP3 LTSS python Unsupported
SUSE Linux Enterprise Server 11 SP4 python Unsupported
SUSE Linux Enterprise Server 12 SP1 LTSS python Unsupported
SUSE Linux Enterprise Server 12 SP2 python Unsupported
SUSE Linux Enterprise Server 12 SP3 python Unsupported
SUSE Linux Enterprise Software Development Kit 11 SP4 python Unsupported
SUSE Manager Proxy python-backports.ssl_match_hostname Already fixed
SUSE Manager Server python-backports.ssl_match_hostname Already fixed
SUSE Manager Tools python-backports.ssl_match_hostname Already fixed
SUSE OpenStack Cloud 6 python-backports.ssl_match_hostname Already fixed
SUSE OpenStack Cloud 7 python-backports.ssl_match_hostname Already fixed