Bug 1875549 (CVE-2020-14387)

Summary: CVE-2020-14387 rsync: rsync-ssl does not verify the hostname in the server certificate when using openssl
Product: [Other] Security Response Reporter: Todd Cullum <tcullum>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: carnil, code, luhliari, mruprich, ssorce
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: rsync 3.2.4 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-09-03 19:17:51 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1875550    
Bug Blocks: 1872966    

Description Todd Cullum 2020-09-03 18:19:31 UTC
In rsync > 3.2.0pre1, rsync-ssl does not verify the hostname in the server certificate in openssl mode, so a man-in-the-middle attacker with a valid certificate for another hostname could intercept connections.

Upstream patch: https://git.samba.org/?p=rsync.git;a=commit;h=c3f7414

Comment 1 Todd Cullum 2020-09-03 18:19:34 UTC
Acknowledgments:

Name: Matt McCutchen

Comment 2 Todd Cullum 2020-09-03 18:20:43 UTC
Created rsync tracking bugs for this issue:

Affects: fedora-32 [bug 1875550]

Comment 4 Product Security DevOps Team 2020-09-03 19:17:51 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-14387

Comment 5 Salvatore Bonaccorso 2020-09-04 12:55:25 UTC
Hi

The information that the issue is fixed in 3.2.3: is this correct? Upstream commit c3f7414c450f ("rsync-ssl: Verify the hostname in the certificate when using openssl.") seems to not have been included in the v3.2.3 release.

Regards,
Salvatore

Comment 6 Todd Cullum 2020-09-04 16:09:33 UTC
In reply to comment #5:
> The information that the issue is fixed in 3.2.3: is this correct? 

You're right, that's incorrect and occurred due to misinterpretation of a comment regarding a new  *package* release of 3.2.3 with a patch, and not the patch being in 3.2.3 itself. I've adjusted the metadata accordingly. Thanks for reporting that and apologize for confusion around this.

Comment 8 Eric Christensen 2020-09-08 14:58:57 UTC
Mitigation:

This vulnerability can be mitigated by not using rsync-ssl in openssl mode.

Comment 9 Todd Cullum 2020-09-11 17:50:25 UTC
To be fixed in the 3.2.4 release[1].

https://download.samba.org/pub/rsync/NEWS#3.2.4