| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: rsync | Distribution: openSUSE Tumbleweed |
| Version: 3.4.1 | Vendor: openSUSE |
| Release: 4.2 | Build date: Tue Dec 16 13:40:48 2025 |
| Group: Productivity/Networking/Other | Build host: reproducible |
| Size: 974037 | Source RPM: rsync-3.4.1-4.2.src.rpm |
| Packager: https://bugs.opensuse.org | |
| Url: https://rsync.samba.org/ | |
| Summary: Versatile tool for fast incremental file transfer | |
Rsync is a fast and extraordinarily versatile file copying tool. It can copy locally, to/from another host over any remote shell, or to/from a remote rsync daemon. It offers a large number of options that control every aspect of its behavior and permit very flexible specification of the set of files to be copied. It is famous for its delta-transfer algorithm, which reduces the amount of data sent over the network by sending only the differences between the source files and the existing files in the destination. Rsync is widely used for backups and mirroring and as an improved copy command for everyday use.
GPL-3.0-or-later
* Tue Dec 16 2025 David Anes <david.anes@suse.com>
- Security update (CVE-2025-10158, bsc#1254441): rsync: Out of
bounds array access via negative index
- Add rsync-CVE-2025-10158.patch
* Fri Mar 28 2025 Friedrich Haubensak <hsk17@mail.de>
- Add rsync341-gcc15-bool.patch to fix gcc15 compile time error
* Wed Jan 22 2025 Dominique Leuenberger <dimstar@opensuse.org>
- Drop rcFOO symlinks for CODE16 (PED-266).
* Fri Jan 17 2025 ecsos <ecsos@opensuse.org>
- Update to 3.4.1
* BUG FIXES:
- fixed handling of -H flag with conflict in internal flag values
- fixed a user after free in logging of failed rename
- fixed build on systems without openat()
- removed dependency on alloca() in bundled popt
* DEVELOPER RELATED:
- fix to permissions handling in the developer release script
- Drop 705.patch, because now in upstream.
* Thu Jan 16 2025 Andreas Stieger <andreas.stieger@gmx.de>
- update to 3.4.1
* fixed handling of -H flag with conflict in internal flag values
(replaces 705.patch)
* fixed a user after free in logging of failed rename
* fixed build on systems without openat()
* removed dependency on alloca() in bundled popt
* Wed Jan 15 2025 Marcus Rueckert <mrueckert@suse.de>
- Backport patch from PR 705 to fix broken handling of hashes and
hard links:
* Add 705.patch
* Wed Jan 15 2025 Angel Yankov <angel.yankov@suse.com>
- Update to 3.4
* Bump to protocol 32
Drop CVE patches:
* Drop rsync-gcc14.patch
* Removed rsync-CVE-2024-12084-overflow-01.patch
* Removed rsync-CVE-2024-12084-overflow-02.patch
* Removed rsync-CVE-2024-12085.patch
* Removed rsync-CVE-2024-12086_01.patch
* Removed rsync-CVE-2024-12086_02.patch
* Removed rsync-CVE-2024-12086_03.patch
* Removed rsync-CVE-2024-12086_04.patch
* Removed rsync-CVE-2024-12087_01.patch
* Removed rsync-CVE-2024-12087_02.patch
* Removed rsync-CVE-2024-12088.patch
* Removed rsync-CVE-2024-12747.patch
* Tue Jan 14 2025 Angel Yankov <angel.yankov@suse.com>
- Security update,CVE-2024-12747, bsc#1235475 race condition in handling symbolic links
* Added rsync-CVE-2024-12747.patch
* Thu Jan 09 2025 Angel Yankov <angel.yankov@suse.com>
- Security update, fix multiple vulnerabilities:
* CVE-2024-12084, bsc#1234100 - Heap Buffer Overflow in Checksum Parsing
* CVE-2024-12085, bsc#1234101 - Info Leak via uninitialized Stack contents defeats ASLR
* CVE-2024-12086, bsc#1234102 - Server leaks arbitrary client files
* CVE-2024-12087, bsc#1234103 - Server can make client write files outside of destination directory using symbolic links
* CVE-2024-12088, bsc#1234104 - --safe-links Bypass
* Added rsync-CVE-2024-12084-overflow-01.patch
* Added rsync-CVE-2024-12084-overflow-02.patch
* Added rsync-CVE-2024-12085.patch
* Added rsync-CVE-2024-12086_01.patch
* Added rsync-CVE-2024-12086_02.patch
* Added rsync-CVE-2024-12086_03.patch
* Added rsync-CVE-2024-12086_04.patch
* Added rsync-CVE-2024-12087_01.patch
* Added rsync-CVE-2024-12087_02.patch
* Added rsync-CVE-2024-12088.patch
* Fri Sep 06 2024 Marcus Meissner <meissner@suse.com>
- rsync-gcc14.patch: fixed the ipv6 configure check (bsc#1230156)
* Thu Sep 05 2024 Georg Pfuetzenreuter <mail+rpm@georg-pfuetzenreuter.net>
- Add rsyncd-return-from-list-command-with-0.patch to not treat #list as failure
* Mon Aug 26 2024 Thorsten Kukuk <kukuk@suse.com>
- add patch rsync-run-dir.patch:
* Drop dependency on /var/run compat symlink, this causes problems
on image based systems
* Thu May 23 2024 David Anes <david.anes@suse.com>
- Correcly enable SIMD in x64: the flag was renamed from
- -enable-simd to -enable-roll-simd in 3.2.4
- Remove leftovers from previous versions:
* rsync-patches-3.2.7.tar.gz
* rsync-patches-3.2.7.tar.gz.asc
* Thu Apr 18 2024 David Anes <david.anes@suse.com>
- Update to 3.3.0
* BUG FIXES:
- Fixed a bug with --sparse --inplace where a trailing gap in
the source file would not clear out the trailing data in the
destination file.
- Fixed an buffer overflow in the checksum2 code if SHA1 is
being used for the checksum2 algorithm.
- Fixed an issue when rsync is compiled using _FORTIFY_SOURCE so
that the extra tests don't complain about a strlcpy() limit
value (which was too large, even though it wasn't possible for
the larger value to cause an overflow).
(fix bsc#1214616, bsc#1214249)
- Add a backtick to the list of characters that the filename
quoting needs to escape using backslashes.
- Fixed a string-comparison issue in the internal handling of
- -progress (a locale such as tr_TR.utf-8 needed the internal
triggering of --info options to use upper-case flag names to
ensure that they match).
- Make sure that a local transfer marks the sender side as
trusted.
- Change the argv handling to work with a newer popt library
- - one that likes to free more data than it used to.
- Rsync now calls OpenSSL_add_all_algorithms() when compiled
against an older openssl library.
- Fixed a problem in the daemon auth for older protocols
(29 and before) if the openssl library is being used to
compute MD4 checksums.
- Fixed rsync -VV on Cygwin -- it needed a flush of stdout.
- Fixed an old stats bug that counted devices as symlinks.
* ENHANCEMENTS:
- Enhanced rrsync with the -no-overwrite option that allows you
to ensure that existing files on your restricted but writable
directory can't be modified.
- Enhanced the manpages to mark links with .UR & .UE. If your
nroff doesn't support these idioms, touch the file
.md2man-force in the source directory so that md-convert gets
called with the --force-link-text option, and that should
ensure that your manpages are still readable even with the
ignored markup.
- Some manpage improvements on the handling of [global] modules.
- Changed the mapfrom & mapto perl scripts (in the support dir)
into a single python script named idmap. Converted a couple
more perl scripts into python.
- Changed the mnt-excl perl script (in the support dir) into a
python script.
* DEVELOPER RELATED:
- Updated config.guess (timestamp 2023-01-01) and config.sub
(timestamp 2023-01-21).
- Drop rsync-fortified-strlcpy-fix.patch (included upstream).
* Tue Mar 12 2024 Bernhard Wiedemann <bwiedemann@suse.com>
- Avoid package changes in %check
* Wed Nov 29 2023 Stefan Schubert <schubi@suse.com>
- Moved rsyncd.conf and rsyncd.secrets to /usr/etc.
* Add rsync-usr-etc.patch
* Wed Sep 06 2023 David Anes <david.anes@suse.com>
- Rename patch to follow naming patch policies:
fortified-strlcpy-fix.patch -> rsync-fortified-strlcpy-fix.patch
* Wed Sep 06 2023 Thorsten Kukuk <kukuk@suse.com>
- Use "slp" for bcond, not "openslp", like we use for all other
packages, too.
- Disable slp patch and configure option if bcond slp is disabled.
* Tue Sep 05 2023 Dirk Müller <dmueller@suse.com>
- add fortified-strlcpy-fix.patch (bsc#1214616, bsc#1214249)
* Tue Sep 05 2023 Fabian Vogt <fvogt@suse.com>
- Disable openslp support on new distros (bsc#1214884)
* Wed Jul 26 2023 Antonio Teixeira <antonio.teixeira@suse.com>
- Add support directory to %docdir.
Includes some upstream provided scripts such as rrsync. (bsc#1212198)
* Thu Apr 06 2023 Johannes Segitz <jsegitz@suse.com>
- Switch rsyncd symlink to a wrapper script to allow setting a distinct
SELinux type (bsc#1209654)
/usr/bin/rsync /usr/bin/rsync-ssl /usr/bin/rsyncstats /usr/etc/logrotate.d/rsync /usr/etc/rsyncd.conf /usr/etc/rsyncd.secrets /usr/lib/systemd/system/rsyncd.service /usr/lib/systemd/system/rsyncd.socket /usr/lib/systemd/system/rsyncd@.service /usr/sbin/rsyncd /usr/share/doc/packages/rsync /usr/share/doc/packages/rsync/NEWS.md /usr/share/doc/packages/rsync/README.md /usr/share/doc/packages/rsync/support /usr/share/doc/packages/rsync/support/Makefile /usr/share/doc/packages/rsync/support/atomic-rsync /usr/share/doc/packages/rsync/support/cvs2includes /usr/share/doc/packages/rsync/support/deny-rsync /usr/share/doc/packages/rsync/support/file-attr-restore /usr/share/doc/packages/rsync/support/files-to-excludes /usr/share/doc/packages/rsync/support/git-set-file-times /usr/share/doc/packages/rsync/support/idmap /usr/share/doc/packages/rsync/support/install_deps_ubuntu.sh /usr/share/doc/packages/rsync/support/instant-rsyncd /usr/share/doc/packages/rsync/support/json-rsync-version /usr/share/doc/packages/rsync/support/logfilter /usr/share/doc/packages/rsync/support/lsh /usr/share/doc/packages/rsync/support/lsh.sh /usr/share/doc/packages/rsync/support/mnt-excl /usr/share/doc/packages/rsync/support/munge-symlinks /usr/share/doc/packages/rsync/support/nameconvert /usr/share/doc/packages/rsync/support/rrsync /usr/share/doc/packages/rsync/support/rrsync.1.md /usr/share/doc/packages/rsync/support/rsync-no-vanished /usr/share/doc/packages/rsync/support/rsync-slash-strip /usr/share/doc/packages/rsync/support/rsyncstats /usr/share/doc/packages/rsync/support/savetransfer.c /usr/share/doc/packages/rsync/tech_report.tex /usr/share/licenses/rsync /usr/share/licenses/rsync/COPYING /usr/share/man/man1/rsync-ssl.1.gz /usr/share/man/man1/rsync.1.gz /usr/share/man/man5/rsyncd.conf.5.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Apr 1 23:32:50 2026