A flaw was found in rsync version 3.2.0pre1 to 3.2.4. rsync-ssl does not verify the hostname in the server certificate in openssl mode, so a remote, unauthenticated man-in-the-middle attacker with a valid certificate for another hostname could intercept connections.
A flaw was found in rsync version 3.2.0pre1 to 3.2.4. rsync-ssl does not verify the hostname in the server certificate in openssl mode, so a remote, unauthenticated man-in-the-middle attacker with a valid certificate for another hostname could intercept connections.
https://bugzilla.redhat.com/show_bug.cgi?id=1875549 https://git.samba.org/?p=rsync.git;a=commitdiff;h=c3f7414c450faaf6a8281cc4a4403529aeb7d859