Updated rsync packages that fix one bug are now available for Red Hat EnterpriseLinux 5 Extended Update Support.

The rsync tool is used to copy and synchronize files locally or across anetwork. The rsync works very fast because it uses delta encoding and sends justdifferences in files instead of whole files. The rsync is also used as powerfulmirroring tool. This update fixes the following bug: * After the latest rsync packages rebase, there was a behavioral incompatibilityin the different versions of the rsync utility. The rebased rsync removedextended attributes of files incorrectly, producing an error message andreturning a non-zero return code, which could confuse the users. With thisupdate, rsync produces the mentioned error message only in the verbose mode andcorrectly returns “0”, which corresponds with the behavior of the previouslyshipped versions of rsync. (BZ#1146417)Users of rsync are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux EUS (v. 5.9.z server)

SRPMS:
rsync-3.0.6-6.el5_9.src.rpm
    MD5: 83ba46ece8b5f1cbb495981fe61d4109SHA-256: b5a483a52996677af057bae677961cfa058f9803cf83e4ce43f7d37bfb7bf402
 
IA-32:
rsync-3.0.6-6.el5_9.i386.rpm
    MD5: bb3ec2fd6a768f66d6bc71046378237fSHA-256: 194118fa60439e599a9eb83a28ca0ba0341ac3460fe27cb569a1af7e941fc02b
rsync-debuginfo-3.0.6-6.el5_9.i386.rpm
    MD5: 2b423a4eb4224d5275310cc3dbcab5a3SHA-256: fa68141a258e3c0b6198b14a2e0b77700d229702f008d24452b6fefef7908ff4
 
IA-64:
rsync-3.0.6-6.el5_9.ia64.rpm
    MD5: d6cd242bc3283171ef472bf17ac58276SHA-256: 8971beda8626cf740e4cc68f6cc9f8327c8f598996104eccb840e281ec89c5d5
rsync-debuginfo-3.0.6-6.el5_9.ia64.rpm
    MD5: 3908ab25582b5bcae0061d76a63f12eaSHA-256: 8067ea0fbe82a98d30cad0d9d2bfa4d40abd10ef695783fd8c9efe024996adc2
 
PPC:
rsync-3.0.6-6.el5_9.ppc.rpm
    MD5: 677fb5a74effd8ce5dc5226117dc7784SHA-256: 0028704269f8a05df654b990b2257f50eedd51194aafa76908da0d921fdea908
rsync-debuginfo-3.0.6-6.el5_9.ppc.rpm
    MD5: a04b010ab9bd576221f3777f9f918da7SHA-256: dab76721c25b21450aec2a304c0ca6fa4a7d20432956500ce9054b943d8f9431
 
s390x:
rsync-3.0.6-6.el5_9.s390x.rpm
    MD5: c53d92f7040d0327e46438cbd4bf204eSHA-256: a488cb40d14c3844411b3733f7692227cacd232593f0807d69a9b0f82966cf5a
rsync-debuginfo-3.0.6-6.el5_9.s390x.rpm
    MD5: 95d1512ce940d681e0833948b07b1755SHA-256: d5059d80422f7ed70af2ff3754b3218c7b3b767f81c7a786e8abc17dd6776b6a
 
x86_64:
rsync-3.0.6-6.el5_9.x86_64.rpm
    MD5: 602130e26dc744f03cde6705efa05ffeSHA-256: f5adec38946fbd598f69755cab9911877362cd94fac4c84414287b07f5719656
rsync-debuginfo-3.0.6-6.el5_9.x86_64.rpm
    MD5: 5429867b22cbee46f1e537e7b23238d9SHA-256: 29fed133d84e2a52ee0252111fd6f67bdeeda8d9533e0c7df23771ce19851141
 
Red Hat Enterprise Linux Long Life (v. 5.9 server)

SRPMS:
rsync-3.0.6-6.el5_9.src.rpm
    MD5: 83ba46ece8b5f1cbb495981fe61d4109SHA-256: b5a483a52996677af057bae677961cfa058f9803cf83e4ce43f7d37bfb7bf402
 
IA-32:
rsync-3.0.6-6.el5_9.i386.rpm
    MD5: bb3ec2fd6a768f66d6bc71046378237fSHA-256: 194118fa60439e599a9eb83a28ca0ba0341ac3460fe27cb569a1af7e941fc02b
rsync-debuginfo-3.0.6-6.el5_9.i386.rpm
    MD5: 2b423a4eb4224d5275310cc3dbcab5a3SHA-256: fa68141a258e3c0b6198b14a2e0b77700d229702f008d24452b6fefef7908ff4
 
IA-64:
rsync-3.0.6-6.el5_9.ia64.rpm
    MD5: d6cd242bc3283171ef472bf17ac58276SHA-256: 8971beda8626cf740e4cc68f6cc9f8327c8f598996104eccb840e281ec89c5d5
rsync-debuginfo-3.0.6-6.el5_9.ia64.rpm
    MD5: 3908ab25582b5bcae0061d76a63f12eaSHA-256: 8067ea0fbe82a98d30cad0d9d2bfa4d40abd10ef695783fd8c9efe024996adc2
 
x86_64:
rsync-3.0.6-6.el5_9.x86_64.rpm
    MD5: 602130e26dc744f03cde6705efa05ffeSHA-256: f5adec38946fbd598f69755cab9911877362cd94fac4c84414287b07f5719656
rsync-debuginfo-3.0.6-6.el5_9.x86_64.rpm
    MD5: 5429867b22cbee46f1e537e7b23238d9SHA-256: 29fed133d84e2a52ee0252111fd6f67bdeeda8d9533e0c7df23771ce19851141
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply