Linux repositories inspector

rsync - fast, versatile, remote (and local) file-copying tool

rsync is a fast and versatile file-copying tool which can copy locally and to/from a remote host. It offers many options to control its behavior, and its remote-update protocol can minimize network traffic to make transferring updates between machines fast and efficient.
It is widely used for backups and mirroring and as an improved copy command for everyday use.
This package provides both the rsync command line tool and optional daemon functionality.
Original maintainer
Homepagehttps://rsync.samba.org/
3.1.3
Arch iconArch rolling
Debian iconDebian 10.0
Fedora iconFedora 28
Fedora iconFedora 29
Fedora iconFedora 30
Fedora iconFedora 31
Fedora iconFedora rawhide
Manjaro iconManjaro rolling
OpenSUSE iconOpenSUSE Leap 15.0
OpenSUSE iconOpenSUSE Leap 15.1
OpenSUSE iconOpenSUSE Leap 15.2
OpenSUSE iconOpenSUSE Tumbleweed
Ubuntu iconUbuntu 19.04
Ubuntu iconUbuntu 19.10
Ubuntu iconUbuntu 20.04
3.1.2
CentOS iconCentOS 7.7.1908
Debian iconDebian 9.0
Ubuntu iconUbuntu 17.10
Ubuntu iconUbuntu 18.04 LTS
Ubuntu iconUbuntu 18.10
3.1.1
Ubuntu iconUbuntu 16.04 LTS
3.1.0
OpenSUSE iconOpenSUSE Leap 42.3
DistributionVersionSincePackageInstalledPackager
Arch iconArch rolling extra/oszst3.1.3-32020-01-15278 kiB514 kiB
CentOS iconCentOS 7.7.1908 osrpm3.1.2-6.el7_6.12020-01-07404 kiB815 kiBCentOS BuildSystem
Debian iconDebian 10.0 buster/maindeb3.1.3-62019-03-20387 kiB729 kiB
Debian iconDebian 9.0 stretch/maindeb3.1.2-1+deb9u22019-06-17384 kiB687 kiB
Fedora iconFedora 28 releases/Everything-osrpm3.1.3-3.fc282019-01-14403 kiB832 kiBFedora Project
Fedora iconFedora 28 releases/Server-osrpm3.1.3-3.fc282019-01-14403 kiB832 kiBFedora Project
Fedora iconFedora 28 releases/Workstation-osrpm3.1.3-3.fc282019-01-14403 kiB832 kiBFedora Project
Fedora iconFedora 29 releases/Everything-osrpm3.1.3-4.fc292019-01-14388 kiB837 kiBFedora Project
Fedora iconFedora 29 releases/Server-osrpm3.1.3-4.fc292019-01-14388 kiB837 kiBFedora Project
Fedora iconFedora 29 releases/Workstation-osrpm3.1.3-4.fc292019-01-14388 kiB837 kiBFedora Project
Fedora iconFedora 29 releases-test/Everything-osrpm3.1.3-4.fc292019-01-14388 kiB837 kiBFedora Project
Fedora iconFedora 29 releases-test/Server-osrpm3.1.3-4.fc292019-01-14388 kiB837 kiBFedora Project
Fedora iconFedora 29 releases-test/Workstation-osrpm3.1.3-4.fc292019-01-14388 kiB837 kiBFedora Project
Fedora iconFedora 30 releases/Everything-osrpm3.1.3-7.fc302019-06-17380 kiB919 kiBFedora Project
Fedora iconFedora 30 releases/Server-osrpm3.1.3-7.fc302019-06-17380 kiB919 kiBFedora Project
Fedora iconFedora 30 releases/Workstation-osrpm3.1.3-7.fc302019-06-17380 kiB919 kiBFedora Project
Fedora iconFedora 30 releases-test/Server-osrpm3.1.3-6.fc302019-06-17380 kiB919 kiBFedora Project
Fedora iconFedora 30 releases-test/Workstation-osrpm3.1.3-6.fc302019-06-17380 kiB919 kiBFedora Project
Fedora iconFedora 31 releases/Everything-osrpm3.1.3-9.fc312020-01-07406 kiB850 kiBFedora Project
Fedora iconFedora 31 releases/Server-osrpm3.1.3-9.fc312020-01-07406 kiB850 kiBFedora Project
Fedora iconFedora rawhide development/Everything-osrpm3.1.3-11.fc322020-02-08406 kiB844 kiBFedora Project
Fedora iconFedora rawhide development/Server-osrpm3.1.3-11.fc322020-02-08406 kiB844 kiBFedora Project
Fedora iconFedora rawhide development/Workstation-osrpm3.1.3-9.fc312019-08-03406 kiB850 kiBFedora Project
Manjaro iconManjaro rolling stable/extraxz3.1.3-12018-02-03294 kiB563 kiB
Manjaro iconManjaro rolling testing/extraxz3.1.3-12018-01-31294 kiB563 kiB
Manjaro iconManjaro rolling unstable/extraxz3.1.3-12018-01-29294 kiB563 kiB
OpenSUSE iconOpenSUSE Leap 15.0 ossrpm3.1.3-lp150.2.12019-01-17312 kiB576 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm3.1.3-lp150.3.3.12019-06-17305 kiB576 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.1 ossrpm3.1.3-lp151.3.32019-01-23312 kiB576 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.1 update/ossrpm3.1.3-lp151.4.3.12019-06-17306 kiB576 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.2 ossrpm3.1.3-lp152.5.52020-01-07305 kiB576 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 ossrpm3.1.0-8.42019-01-17323 kiB625 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm3.1.0-16.12019-01-21326 kiB626 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm3.1.0-13.12019-01-21326 kiB626 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm3.1.0-10.12019-01-21325 kiB626 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Tumbleweed ossrpm3.1.3-5.12019-07-17299 kiB563 kiBhttps://bugs.opensuse.org
Ubuntu iconUbuntu 17.10 artful/maindeb3.1.2-22017-11-10325 kiB699 kiB
Ubuntu iconUbuntu 17.10 artful-security/maindeb3.1.2-2ubuntu0.22018-01-23326 kiB703 kiB
Ubuntu iconUbuntu 17.10 artful-updates/maindeb3.1.2-2ubuntu0.22018-01-23326 kiB703 kiB
Ubuntu iconUbuntu 18.04 LTS bionic/maindeb3.1.2-2.1ubuntu12018-02-26326 kiB703 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-security/maindeb3.1.2-2.1ubuntu1.12020-02-25327 kiB704 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-updates/maindeb3.1.2-2.1ubuntu1.12020-02-25327 kiB704 kiB
Ubuntu iconUbuntu 18.10 cosmic/maindeb3.1.2-2.22019-01-14327 kiB707 kiB
Ubuntu iconUbuntu 19.04 disco/maindeb3.1.3-62019-04-04327 kiB741 kiB
Ubuntu iconUbuntu 19.10 eoan/maindeb3.1.3-62019-06-17327 kiB741 kiB
Ubuntu iconUbuntu 20.04 focal/maindeb3.1.3-82020-01-07314 kiB680 kiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb3.1.1-3ubuntu12017-11-10317 kiB680 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb3.1.1-3ubuntu1.32020-02-25321 kiB692 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb3.1.1-3ubuntu1.32020-02-25321 kiB692 kiB

Manual pages

rsync(1)

rsync - a fast, versatile, remote (and local) file-copying tool

rsyncd.conf(5)

rsyncd.conf - configuration file for rsync in daemon mode

Latest updates

Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/main: Version 3.1.2-2.1ubuntu1.1 introduced

2020-02-25
  • SECURITY UPDATE: improper pointer arithmetic might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9840.patch: remove offset pointer optimization in inftrees.c.
    • CVE-2016-9840
  • SECURITY UPDATE: improper pointer arithmetic might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9841.patch: use post-increment only in inffast.c.
    • CVE-2016-9841
  • SECURITY UPDATE: vectors involving left shifts of negative integers might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9842_1.patch: avoid shifts of negative values in inflateMark().
    • debian/patches/CVE-2016-9842_2.patch: avoid casting an out-of-range value to long.
    • CVE-2016-9842
  • SECURITY UPDATE: vectors involving big-endian CRC calculation might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9843.patch: avoid pre-decrement of pointer in big-endian CRC calculation.
    • CVE-2016-9843
Ubuntu icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 3.1.1-3ubuntu1.2 to 3.1.1-3ubuntu1.3

2020-02-25
  • SECURITY UPDATE: improper pointer arithmetic might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9840.patch: remove offset pointer optimization in inftrees.c.
    • CVE-2016-9840
  • SECURITY UPDATE: improper pointer arithmetic might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9841.patch: use post-increment only in inffast.c.
    • CVE-2016-9841
  • SECURITY UPDATE: vectors involving left shifts of negative integers might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9842_1.patch: avoid shifts of negative values in inflateMark().
    • debian/patches/CVE-2016-9842_2.patch: avoid casting an out-of-range value to long.
    • CVE-2016-9842
  • SECURITY UPDATE: vectors involving big-endian CRC calculation might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9843.patch: avoid pre-decrement of pointer in big-endian CRC calculation.
    • CVE-2016-9843
Ubuntu icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 3.1.1-3ubuntu1.2 to 3.1.1-3ubuntu1.3

2020-02-25
  • SECURITY UPDATE: improper pointer arithmetic might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9840.patch: remove offset pointer optimization in inftrees.c.
    • CVE-2016-9840
  • SECURITY UPDATE: improper pointer arithmetic might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9841.patch: use post-increment only in inffast.c.
    • CVE-2016-9841
  • SECURITY UPDATE: vectors involving left shifts of negative integers might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9842_1.patch: avoid shifts of negative values in inflateMark().
    • debian/patches/CVE-2016-9842_2.patch: avoid casting an out-of-range value to long.
    • CVE-2016-9842
  • SECURITY UPDATE: vectors involving big-endian CRC calculation might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9843.patch: avoid pre-decrement of pointer in big-endian CRC calculation.
    • CVE-2016-9843
Ubuntu icon

Ubuntu 18.04 LTS bionic-security/main: Version 3.1.2-2.1ubuntu1.1 introduced

2020-02-25
  • SECURITY UPDATE: improper pointer arithmetic might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9840.patch: remove offset pointer optimization in inftrees.c.
    • CVE-2016-9840
  • SECURITY UPDATE: improper pointer arithmetic might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9841.patch: use post-increment only in inffast.c.
    • CVE-2016-9841
  • SECURITY UPDATE: vectors involving left shifts of negative integers might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9842_1.patch: avoid shifts of negative values in inflateMark().
    • debian/patches/CVE-2016-9842_2.patch: avoid casting an out-of-range value to long.
    • CVE-2016-9842
  • SECURITY UPDATE: vectors involving big-endian CRC calculation might allow context-dependent attackers to have unspecified impact
    • debian/patches/CVE-2016-9843.patch: avoid pre-decrement of pointer in big-endian CRC calculation.
    • CVE-2016-9843
Fedora icon

Fedora rawhide development/Server-os: Updated from 3.1.3-10.fc32 to 3.1.3-11.fc32

2020-02-08
Fedora icon

Fedora rawhide development/Everything-os: Updated from 3.1.3-10.fc32 to 3.1.3-11.fc32

2020-02-08
Arch icon

Arch rolling testing/os: Version 3.1.3-3 removed

2020-01-15
Arch icon

Arch rolling testing/os: Version 3.1.3-3 introduced

2020-01-14
Arch icon

Arch rolling testing/os: Version 3.1.3-2 removed

2020-01-12
Arch icon

Arch rolling testing/os: Version 3.1.3-2 introduced

2020-01-10
Fedora icon

Fedora 31 releases/Server-os: Version 3.1.3-9.fc31 introduced

2020-01-07
Fedora icon

Fedora 31 releases/Everything-os: Version 3.1.3-9.fc31 introduced

2020-01-07
OpenSUSE icon

OpenSUSE Leap 15.2 oss: Version 3.1.3-lp152.5.5 introduced

2020-01-07
  • Fixed bug numbers in spec file
CentOS icon

CentOS 7.7.1908 os: Version 3.1.2-6.el7_6.1 introduced

2020-01-07
  • Related: #1615799 - reverting changes made in RHEL-7.6
Ubuntu icon

Ubuntu 20.04 focal/main: Version 3.1.3-8 introduced

2020-01-07
  • Link rrsync in /usr/bin/
  • Run upstream tests at build time:
    • d/rules: Stop overriding dh_auto_test
    • d/p/noatime.diff: Change patch to address test failure
  • Run upstream tests on autopkgtest
  • d/rsync.install: Move scripts to /usr/share/ instead of usr/share/doc/ (closes: #911321):
    • rsync.NEWS: Create file and tell about scripts new location
  • d/salsa-ci.yml: Skip repro tests for now
  • d/p/noatime.diff:
    • Fix DEP-3 headers
    • Fix typo
Fedora icon

Fedora rawhide development/Everything-os: Updated from 3.1.3-9.fc31 to 3.1.3-10.fc32

2019-10-12
  • Enabling upstream test suite during build rhbz#1533846
Fedora icon

Fedora rawhide development/Server-os: Updated from 3.1.3-9.fc31 to 3.1.3-10.fc32

2019-10-12
  • Enabling upstream test suite during build rhbz#1533846
Ubuntu icon

Ubuntu 16.04 LTS xenial-updates/main: Version 3.1.1-3ubuntu1.2 reintroduced

2019-10-02
  • SECURITY UPDATE: receive_xattr function does not check for '0' character allowing denial of service attacks
    • debian/patches/CVE-2017-16548.patch: enforce trailing
      0 when receiving xattr values in xattrs.c.
    • CVE-2017-16548
  • SECURITY UPDATE: Allows remote attacker to bypass argument
    • debian/patches/CVE-2018-5764.patch: Ignore --protect-args when already sent by client in options.c.
    • CVE-2018-5764
Ubuntu icon

Ubuntu 16.04 LTS xenial-updates/main: Version 3.1.1-3ubuntu1.2 removed

2019-10-02
Ubuntu icon

Ubuntu 19.10 eoan/main: Version 3.1.3-6 reintroduced

2019-08-19
  • Apply CVEs from 2016 to the zlib code.
    closes:#924509

Related packages

rsync-bpc - A customized version of rsync that is used as part of BackupPC
rsync-bpc-debuginfo - Debug information for package rsync-bpc
rsync-bpc-debugsource - Debug sources for package rsync-bpc
rsync-daemon - Service for anonymous access to rsync
rsync-debuginfo - Debug information for package rsync
rsync-debugsource - Debug sources for package rsync
⇧ Top