Upstream information

CVE-2014-9365 at MITRE

Description

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Note from the SUSE Security Team

We are currently not planning to backport this security feature, on fear of breaking a significant percentage of customer scenarios on local sites with invalid SSL certificates. Future service packs and products will have this feature enabled by default.

SUSE Bugzilla entries: 909713 [RESOLVED / FIXED], 930802 [RESOLVED]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
CaaS Platform 1.0 python Unsupported
CaaS Platform 1.0 python-backports.ssl_match_hostname Already fixed
CaaS Platform 2.0 python Unsupported
CaaS Platform 2.0 python-backports.ssl_match_hostname Already fixed
OpenStack Cloud Magnum Orchestration 7.0 python Unsupported
OpenStack Cloud Magnum Orchestration 7.0 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Client Tools for SUSE Manager 12 GA python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Desktop 12 SP2 python Unsupported
SUSE Linux Enterprise Desktop 12 SP2 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Desktop 12 SP3 python Unsupported
SUSE Linux Enterprise Desktop 12 SP3 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Module for Advanced Systems Management 12 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Module for Containers 12 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise Module for Public Cloud 12 python-backports.ssl_match_hostname Already fixed
SUSE Linux Enterprise SDK 11 SP4 python Unsupported
SUSE Linux Enterprise Server 11 SP3 LTSS python Unsupported
SUSE Linux Enterprise Server 11 SP4 python Unsupported
SUSE Linux Enterprise Server 12 SP1 LTSS python Unsupported
SUSE Linux Enterprise Server 12 SP2 python Unsupported
SUSE Linux Enterprise Server 12 SP3 python Unsupported
SUSE Manager Proxy 3.0 python-backports.ssl_match_hostname Already fixed
SUSE Manager Proxy 3.1 python-backports.ssl_match_hostname Already fixed
SUSE Manager Server 3.0 python-backports.ssl_match_hostname Already fixed
SUSE Manager Server 3.1 python-backports.ssl_match_hostname Already fixed
SUSE Openstack Cloud 6 python-backports.ssl_match_hostname Already fixed
SUSE Openstack Cloud 7 python-backports.ssl_match_hostname Already fixed
SUSE Storage 3 python-backports.ssl_match_hostname Already fixed
SUSE Storage 4 python-backports.ssl_match_hostname Already fixed
SUSE Storage 5 python Unsupported
SUSE Storage 5 python-backports.ssl_match_hostname Already fixed