public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Adolf Belka <adolf.belka@ipfire.org>
To: development@lists.ipfire.org
Subject: [PATCH 1/2] rsync: Update to version 3.4.1
Date: Thu, 16 Jan 2025 18:19:09 +0100	[thread overview]
Message-ID: <20250116171910.2085771-1-adolf.belka@ipfire.org> (raw)

[-- Attachment #1: Type: text/plain, Size: 4688 bytes --]

- Update from version 3.3.0 to 3.4.1 as the previous patch which went from 3.3.0 to 3.4.0
   has only been merged into CU190 and not into next where this patch is being done.
   Not sure if this will cause problems or not. I updated the PAK_VER of rsynce from
   19 to 21 so that it went over the PAK_VER of the version merged into CU190.
- If how I have done it is not the best or not correct just let me know how I should do
   it and I will re-do it.
- Update of rootfile not required.
- Added in enabling xxhash as we have that available in IPFire as another addon.
- Ran rsync -V and confirmed that xxhash is now available to rsync.
- Changelog
    3.4.1
     Release 3.4.1 is a fix for regressions introduced in 3.4.0
     BUG FIXES:
	- fixed handling of -H flag with conflict in internal flag values
	- fixed a user after free in logging of failed rename
	- fixed build on systems without openat()
	- removed dependency on alloca() in bundled popt
     DEVELOPER RELATED:
	- fix to permissions handling in the developer release script
    3.4.0 (This was already in the previous patch that went from 3.3.0 to 3.4.0
	Release 3.4.0 is a security release that fixes a number of important
	 vulnerabilities. For more details on the vulnerabilities please see the CERT
	 report https://kb.cert.org/vuls/id/952657
     PROTOCOL NUMBER:
	- The protocol number was changed to 32 to make it easier for
	  administrators to check their servers have been updated
     SECURITY FIXES:
	Many thanks to Simon Scannell, Pedro Gallegos, and Jasiel Spelman at
	 Google Cloud Vulnerability Research and Aleksei Gorban (Loqpa) for
	 discovering these vulnerabilities and working with the rsync project
	 to develop and test fixes.
	- CVE-2024-12084 - Heap Buffer Overflow in Checksum Parsing.
	- CVE-2024-12085 - Info Leak via uninitialized Stack contents defeats ASLR.
	- CVE-2024-12086 - Server leaks arbitrary client files.
	- CVE-2024-12087 - Server can make client write files outside of destination directory using symbolic links.
	- CVE-2024-12088 - --safe-links Bypass.
	- CVE-2024-12747 - symlink race condition.
     BUG FIXES:
	- Fixed the included popt to avoid a memory error on modern gcc versions.
	- Fixed an incorrect extern variable's type that caused an ACL issue on macOS.
	- Fixed IPv6 configure check
     INTERNAL:
	- Updated included popt to version 1.19.
     DEVELOPER RELATED:
	- Various improvements to the release scripts and git setup.
	- Improved packaging/var-checker to identify variable type issues.
	- added FreeBSD and Solaris CI builds

Signed-off-by: Adolf Belka <adolf.belka(a)ipfire.org>
---
 lfs/rsync | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/lfs/rsync b/lfs/rsync
index fcbcd0ab9..789b100bd 100644
--- a/lfs/rsync
+++ b/lfs/rsync
@@ -1,7 +1,7 @@
 ###############################################################################
 #                                                                             #
 # IPFire.org - A linux based firewall                                         #
-# Copyright (C) 2007-2024  IPFire Team  <info(a)ipfire.org>                     #
+# Copyright (C) 2007-2025  IPFire Team  <info(a)ipfire.org>                     #
 #                                                                             #
 # This program is free software: you can redistribute it and/or modify        #
 # it under the terms of the GNU General Public License as published by        #
@@ -26,7 +26,7 @@ include Config
 
 SUMMARY    = Versatile tool for fast incremental file transfer
 
-VER        = 3.3.0
+VER        = 3.4.1
 
 THISAPP    = rsync-$(VER)
 DL_FILE    = $(THISAPP).tar.gz
@@ -34,9 +34,9 @@ DL_FROM    = $(URL_IPFIRE)
 DIR_APP    = $(DIR_SRC)/$(THISAPP)
 TARGET     = $(DIR_INFO)/$(THISAPP)
 PROG       = rsync
-PAK_VER    = 19
+PAK_VER    = 21
 
-DEPS       =
+DEPS       = libxxhash
 
 SERVICES   =
 
@@ -48,7 +48,7 @@ objects = $(DL_FILE)
 
 $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
 
-$(DL_FILE)_BLAKE2 = 75a3cc50452086aebd16f42d7a309c173cbc1ea156227afb10d2106d0b9043e973676995b8199d22840775ae3df8db97d1c0de5f3aa58afa130c5b1348c3f825
+$(DL_FILE)_BLAKE2 = 79c1cad697547059ee241e20c26d7f97bed3ad062deb856d31a617fead333a2d9f62c7c47c1efaf70033dbc358fe547d034c35e8181abb51a1fc893557882bc7
 
 install : $(TARGET)
 
@@ -89,7 +89,7 @@ $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects))
 	--prefix=/usr \
 	--without-included-popt \
 	--without-included-zlib \
-	--disable-xxhash
+	--enable-xxhash
 
 	cd $(DIR_APP) && make $(MAKETUNING) $(EXTRA_MAKE)
 	cd $(DIR_APP) && make install
-- 
2.48.1


             reply	other threads:[~2025-01-16 17:19 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-01-16 17:19 Adolf Belka [this message]
2025-01-16 17:19 ` [PATCH 2/2] libxxhash: Update to version 0.8.3 and make available to rsync Adolf Belka

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20250116171910.2085771-1-adolf.belka@ipfire.org \
    --to=adolf.belka@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox