opensuse-su-2025:0091-1
Vulnerability from csaf_opensuse
Published
2025-03-15 11:01
Modified
2025-03-15 11:01
Summary
Security update for restic

Notes

Title of the patch
Security update for restic
Description of the patch
This update for restic fixes the following issues: - Fixed CVE-2025-22868: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (boo#1239264) - Update to version 0.17.3 - Fix #4971: Fix unusable mount on macOS Sonoma - Fix #5003: Fix metadata errors during backup of removable disks on Windows - Fix #5101: Do not retry load/list operation if SFTP connection is broken - Fix #5107: Fix metadata error on Windows for backups using VSS - Enh #5096: Allow prune --dry-run without lock - Update to version 0.17.2 - Fix #4004: Support container-level SAS/SAT tokens for Azure backend - Fix #5047: Resolve potential error during concurrent cache cleanup - Fix #5050: Return error if tag fails to lock repository - Fix #5057: Exclude irregular files from backups - Fix #5063: Correctly backup extended metadata when using VSS on Windows - Update to version 0.17.1 - Fix #2004: Correctly handle volume names in backup command on Windows - Fix #4945: Include missing backup error text with --json - Fix #4953: Correctly handle long paths on older Windows versions - Fix #4957: Fix delayed cancellation of certain commands - Fix #4958: Don't ignore metadata-setting errors during restore - Fix #4969: Correctly restore timestamp for files with resource forks on macOS - Fix #4975: Prevent backup --stdin-from-command from panicking - Fix #4980: Skip extended attribute processing on unsupported Windows volumes - Fix #5004: Fix spurious 'A Required Privilege Is Not Held by the Client' error - Fix #5005: Fix rare failures to retry locking a repository - Fix #5018: Improve HTTP/2 support for REST backend - Chg #4953: Also back up files with incomplete metadata - Enh #4795: Display progress bar for restore --verify - Enh #4934: Automatically clear removed snapshots from cache - Enh #4944: Print JSON-formatted errors during restore --json - Enh #4959: Return exit code 12 for 'bad password' errors - Enh #4970: Make timeout for stuck requests customizable - Update to version 0.17.0 - Fix #3600: Handle unreadable xattrs in folders above backup source - Fix #4209: Fix slow SFTP upload performance - Fix #4503: Correct hardlink handling in stats command - Fix #4568: Prevent forget --keep-tags <invalid> from deleting all snapshots - Fix #4615: Make find not sometimes ignore directories - Fix #4656: Properly report ID of newly added keys - Fix #4703: Shutdown cleanly when receiving SIGTERM - Fix #4709: Correct --no-lock handling of ls and tag commands - Fix #4760: Fix possible error on concurrent cache cleanup - Fix #4850: Handle UTF-16 password files in key command correctly - Fix #4902: Update snapshot summary on rewrite - Chg #956: Return exit code 10 and 11 for non-existing and locked repository - Chg #4540: Require at least ARMv6 for ARM binaries - Chg #4602: Deprecate legacy index format and s3legacy repository layout - Chg #4627: Redesign backend error handling to improve reliability - Chg #4707: Disable S3 anonymous authentication by default - Chg #4744: Include full key ID in JSON output of key list - Enh #662: Optionally skip snapshot creation if nothing changed - Enh #693: Include snapshot size in snapshots output - Enh #805: Add bitrot detection to diff command - Enh #828: Improve features of the repair packs command - Enh #1786: Support repositories with empty password - Enh #2348: Add --delete option to restore command - Enh #3067: Add extended options to configure Windows Shadow Copy Service - Enh #3406: Improve dump performance for large files - Enh #3806: Optimize and make prune command resumable - Enh #4006: (alpha) Store deviceID only for hardlinks - Enh #4048: Add support for FUSE-T with mount on macOS - Enh #4251: Support reading backup from a command's standard output - Enh #4287: Support connection to rest-server using unix socket - Enh #4354: Significantly reduce prune memory usage - Enh #4437: Make check command create non-existent cache directory - Enh #4472: Support AWS Assume Role for S3 backend - Enh #4547: Add --json option to version command - Enh #4549: Add --ncdu option to ls command - Enh #4573: Support rewriting host and time metadata in snapshots - Enh #4583: Ignore s3.storage-class archive tiers for metadata - Enh #4590: Speed up mount command's error detection - Enh #4601: Add support for feature flags - Enh #4611: Back up more file metadata on Windows - Enh #4664: Make ls use message_type field in JSON output - Enh #4676: Make key command's actions separate sub-commands - Enh #4678: Add --target option to the dump command - Enh #4708: Back up and restore SecurityDescriptors on Windows - Enh #4733: Allow specifying --host via environment variable - Enh #4737: Include snapshot ID in reason field of forget JSON output - Enh #4764: Support forgetting all snapshots - Enh #4768: Allow specifying custom User-Agent for outgoing requests - Enh #4781: Add restore options to read include/exclude patterns from files - Enh #4807: Support Extended Attributes on Windows NTFS - Enh #4817: Make overwrite behavior of restore customizable - Enh #4839: Add dry-run support to restore command for all the details see https://github.com/restic/restic/releases/tag/v0.17.0 or /usr/share/doc/packages/restic/CHANGELOG.md - Update to version 0.16.5 - Enh #4799: Add option to force use of Azure CLI credential - Enh #4873: Update dependencies - Update to version 0.16.4 This release works around and improves detection of a bug in the compression library used by restic. The resulting issue only happens when using restic 0.16.3 and the max compression level (the default auto and off compression levels are not affected), and when the source files being backed up have specific data in them to trigger the bug. If you use max compression, you can use restic check --read-data to make sure you're not affected. - Update to version 0.16.3 - Fix #4560: Improve errors for irregular files on Windows - Fix #4574: Support backup of deduplicated files on Windows again - Fix #4612: Improve error handling for rclone backend - Fix #4624: Correct restore progress information if an error occurs - Fix #4626: Improve reliability of restoring large files - Update to version 0.16.2 - Fix #4540: Restore ARMv5 support for ARM binaries - Fix #4545: Repair documentation build on Read the Docs - Update to version 0.16.1 A very long list of improvements for all the details see https://github.com/restic/restic/releases/tag/v0.16.1 It contains an important bug fix which prevents data corruption when compression is set to max.
Patchnames
openSUSE-2025-91
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for restic",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for restic fixes the following issues:\n\n- Fixed CVE-2025-22868: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2  (boo#1239264)\n\n- Update to version 0.17.3\n\n  - Fix #4971: Fix unusable mount on macOS Sonoma\n  - Fix #5003: Fix metadata errors during backup of removable disks\n    on Windows\n  - Fix #5101: Do not retry load/list operation if SFTP connection\n    is broken\n  - Fix #5107: Fix metadata error on Windows for backups using VSS\n  - Enh #5096: Allow prune --dry-run without lock\n\n- Update to version 0.17.2\n\n  - Fix #4004: Support container-level SAS/SAT tokens for Azure\n    backend\n  - Fix #5047: Resolve potential error during concurrent cache\n    cleanup\n  - Fix #5050: Return error if tag fails to lock repository\n  - Fix #5057: Exclude irregular files from backups\n  - Fix #5063: Correctly backup extended metadata when using VSS on\n    Windows\n\n- Update to version 0.17.1\n\n  - Fix #2004: Correctly handle volume names in backup command on\n    Windows\n  - Fix #4945: Include missing backup error text with --json\n  - Fix #4953: Correctly handle long paths on older Windows\n    versions\n  - Fix #4957: Fix delayed cancellation of certain commands\n  - Fix #4958: Don\u0027t ignore metadata-setting errors during restore\n  - Fix #4969: Correctly restore timestamp for files with resource\n    forks on macOS\n  - Fix #4975: Prevent backup --stdin-from-command from panicking\n  - Fix #4980: Skip extended attribute processing on unsupported\n    Windows volumes\n  - Fix #5004: Fix spurious \u0027A Required Privilege Is Not Held by\n    the Client\u0027 error\n  - Fix #5005: Fix rare failures to retry locking a repository\n  - Fix #5018: Improve HTTP/2 support for REST backend\n  - Chg #4953: Also back up files with incomplete metadata\n  - Enh #4795: Display progress bar for restore --verify\n  - Enh #4934: Automatically clear removed snapshots from cache\n  - Enh #4944: Print JSON-formatted errors during restore --json\n  - Enh #4959: Return exit code 12 for \u0027bad password\u0027 errors\n  - Enh #4970: Make timeout for stuck requests customizable\n\n- Update to version 0.17.0\n\n  - Fix #3600: Handle unreadable xattrs in folders above backup\n    source\n  - Fix #4209: Fix slow SFTP upload performance\n  - Fix #4503: Correct hardlink handling in stats command\n  - Fix #4568: Prevent forget --keep-tags \u003cinvalid\u003e from deleting\n    all snapshots\n  - Fix #4615: Make find not sometimes ignore directories\n  - Fix #4656: Properly report ID of newly added keys\n  - Fix #4703: Shutdown cleanly when receiving SIGTERM\n  - Fix #4709: Correct --no-lock handling of ls and tag commands\n  - Fix #4760: Fix possible error on concurrent cache cleanup\n  - Fix #4850: Handle UTF-16 password files in key command\n    correctly\n  - Fix #4902: Update snapshot summary on rewrite\n  - Chg #956: Return exit code 10 and 11 for non-existing and\n    locked repository\n  - Chg #4540: Require at least ARMv6 for ARM binaries\n  - Chg #4602: Deprecate legacy index format and s3legacy\n    repository layout\n  - Chg #4627: Redesign backend error handling to improve\n    reliability\n  - Chg #4707: Disable S3 anonymous authentication by default\n  - Chg #4744: Include full key ID in JSON output of key list\n  - Enh #662: Optionally skip snapshot creation if nothing changed\n  - Enh #693: Include snapshot size in snapshots output\n  - Enh #805: Add bitrot detection to diff command\n  - Enh #828: Improve features of the repair packs command\n  - Enh #1786: Support repositories with empty password\n  - Enh #2348: Add --delete option to restore command\n  - Enh #3067: Add extended options to configure Windows Shadow\n    Copy Service\n  - Enh #3406: Improve dump performance for large files\n  - Enh #3806: Optimize and make prune command resumable\n  - Enh #4006: (alpha) Store deviceID only for hardlinks\n  - Enh #4048: Add support for FUSE-T with mount on macOS\n  - Enh #4251: Support reading backup from a command\u0027s standard\n    output\n  - Enh #4287: Support connection to rest-server using unix socket\n  - Enh #4354: Significantly reduce prune memory usage\n  - Enh #4437: Make check command create non-existent cache\n    directory\n  - Enh #4472: Support AWS Assume Role for S3 backend\n  - Enh #4547: Add --json option to version command\n  - Enh #4549: Add --ncdu option to ls command\n  - Enh #4573: Support rewriting host and time metadata in\n    snapshots\n  - Enh #4583: Ignore s3.storage-class archive tiers for metadata\n  - Enh #4590: Speed up mount command\u0027s error detection\n  - Enh #4601: Add support for feature flags\n  - Enh #4611: Back up more file metadata on Windows\n  - Enh #4664: Make ls use message_type field in JSON output\n  - Enh #4676: Make key command\u0027s actions separate sub-commands\n  - Enh #4678: Add --target option to the dump command\n  - Enh #4708: Back up and restore SecurityDescriptors on Windows\n  - Enh #4733: Allow specifying --host via environment variable\n  - Enh #4737: Include snapshot ID in reason field of forget JSON\n    output\n  - Enh #4764: Support forgetting all snapshots\n  - Enh #4768: Allow specifying custom User-Agent for outgoing\n    requests\n  - Enh #4781: Add restore options to read include/exclude patterns\n    from files\n  - Enh #4807: Support Extended Attributes on Windows NTFS\n  - Enh #4817: Make overwrite behavior of restore customizable\n  - Enh #4839: Add dry-run support to restore command\n  for all the details see https://github.com/restic/restic/releases/tag/v0.17.0\n  or /usr/share/doc/packages/restic/CHANGELOG.md\n\n- Update to version 0.16.5\n  - Enh #4799: Add option to force use of Azure CLI credential\n  - Enh #4873: Update dependencies\n\n- Update to version 0.16.4\n  This release works around and improves detection of a bug in the\n  compression library used by restic. The resulting issue only\n  happens when using restic 0.16.3 and the max compression level\n  (the default auto and off compression levels are not affected),\n  and when the source files being backed up have specific data in\n  them to trigger the bug. If you use max compression, you can use\n  restic check --read-data to make sure you\u0027re not affected.\n\n- Update to version 0.16.3\n\n  - Fix #4560: Improve errors for irregular files on Windows\n  - Fix #4574: Support backup of deduplicated files on Windows\n    again\n  - Fix #4612: Improve error handling for rclone backend\n  - Fix #4624: Correct restore progress information if an error\n    occurs\n  - Fix #4626: Improve reliability of restoring large files\n\n- Update to version 0.16.2\n\n  - Fix #4540: Restore ARMv5 support for ARM binaries\n  - Fix #4545: Repair documentation build on Read the Docs\n\n- Update to version 0.16.1\n\n  A very long list of improvements for all the details see\n  https://github.com/restic/restic/releases/tag/v0.16.1\n  It contains an important bug fix which prevents data corruption\n  when compression is set to max.\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2025-91",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_0091-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2025:0091-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WXUOMZG43G5AZBMH5HY5IUTZ2CLZL6M/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2025:0091-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WXUOMZG43G5AZBMH5HY5IUTZ2CLZL6M/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239264",
        "url": "https://bugzilla.suse.com/1239264"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-22868 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-22868/"
      }
    ],
    "title": "Security update for restic",
    "tracking": {
      "current_release_date": "2025-03-15T11:01:16Z",
      "generator": {
        "date": "2025-03-15T11:01:16Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2025:0091-1",
      "initial_release_date": "2025-03-15T11:01:16Z",
      "revision_history": [
        {
          "date": "2025-03-15T11:01:16Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "restic-0.17.3-bp156.2.3.1.aarch64",
                "product": {
                  "name": "restic-0.17.3-bp156.2.3.1.aarch64",
                  "product_id": "restic-0.17.3-bp156.2.3.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "restic-0.17.3-bp156.2.3.1.i586",
                "product": {
                  "name": "restic-0.17.3-bp156.2.3.1.i586",
                  "product_id": "restic-0.17.3-bp156.2.3.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "restic-bash-completion-0.17.3-bp156.2.3.1.noarch",
                "product": {
                  "name": "restic-bash-completion-0.17.3-bp156.2.3.1.noarch",
                  "product_id": "restic-bash-completion-0.17.3-bp156.2.3.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "restic-zsh-completion-0.17.3-bp156.2.3.1.noarch",
                "product": {
                  "name": "restic-zsh-completion-0.17.3-bp156.2.3.1.noarch",
                  "product_id": "restic-zsh-completion-0.17.3-bp156.2.3.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "restic-0.17.3-bp156.2.3.1.ppc64le",
                "product": {
                  "name": "restic-0.17.3-bp156.2.3.1.ppc64le",
                  "product_id": "restic-0.17.3-bp156.2.3.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "restic-0.17.3-bp156.2.3.1.s390x",
                "product": {
                  "name": "restic-0.17.3-bp156.2.3.1.s390x",
                  "product_id": "restic-0.17.3-bp156.2.3.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "restic-0.17.3-bp156.2.3.1.x86_64",
                "product": {
                  "name": "restic-0.17.3-bp156.2.3.1.x86_64",
                  "product_id": "restic-0.17.3-bp156.2.3.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Package Hub 15 SP6",
                "product": {
                  "name": "SUSE Package Hub 15 SP6",
                  "product_id": "SUSE Package Hub 15 SP6"
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.6",
                "product": {
                  "name": "openSUSE Leap 15.6",
                  "product_id": "openSUSE Leap 15.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-0.17.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6",
          "product_id": "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.aarch64"
        },
        "product_reference": "restic-0.17.3-bp156.2.3.1.aarch64",
        "relates_to_product_reference": "SUSE Package Hub 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-0.17.3-bp156.2.3.1.i586 as component of SUSE Package Hub 15 SP6",
          "product_id": "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.i586"
        },
        "product_reference": "restic-0.17.3-bp156.2.3.1.i586",
        "relates_to_product_reference": "SUSE Package Hub 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-0.17.3-bp156.2.3.1.ppc64le as component of SUSE Package Hub 15 SP6",
          "product_id": "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.ppc64le"
        },
        "product_reference": "restic-0.17.3-bp156.2.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Package Hub 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-0.17.3-bp156.2.3.1.s390x as component of SUSE Package Hub 15 SP6",
          "product_id": "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.s390x"
        },
        "product_reference": "restic-0.17.3-bp156.2.3.1.s390x",
        "relates_to_product_reference": "SUSE Package Hub 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-0.17.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6",
          "product_id": "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.x86_64"
        },
        "product_reference": "restic-0.17.3-bp156.2.3.1.x86_64",
        "relates_to_product_reference": "SUSE Package Hub 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-bash-completion-0.17.3-bp156.2.3.1.noarch as component of SUSE Package Hub 15 SP6",
          "product_id": "SUSE Package Hub 15 SP6:restic-bash-completion-0.17.3-bp156.2.3.1.noarch"
        },
        "product_reference": "restic-bash-completion-0.17.3-bp156.2.3.1.noarch",
        "relates_to_product_reference": "SUSE Package Hub 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-zsh-completion-0.17.3-bp156.2.3.1.noarch as component of SUSE Package Hub 15 SP6",
          "product_id": "SUSE Package Hub 15 SP6:restic-zsh-completion-0.17.3-bp156.2.3.1.noarch"
        },
        "product_reference": "restic-zsh-completion-0.17.3-bp156.2.3.1.noarch",
        "relates_to_product_reference": "SUSE Package Hub 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-0.17.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.aarch64"
        },
        "product_reference": "restic-0.17.3-bp156.2.3.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-0.17.3-bp156.2.3.1.i586 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.i586"
        },
        "product_reference": "restic-0.17.3-bp156.2.3.1.i586",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-0.17.3-bp156.2.3.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.ppc64le"
        },
        "product_reference": "restic-0.17.3-bp156.2.3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-0.17.3-bp156.2.3.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.s390x"
        },
        "product_reference": "restic-0.17.3-bp156.2.3.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-0.17.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.x86_64"
        },
        "product_reference": "restic-0.17.3-bp156.2.3.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-bash-completion-0.17.3-bp156.2.3.1.noarch as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:restic-bash-completion-0.17.3-bp156.2.3.1.noarch"
        },
        "product_reference": "restic-bash-completion-0.17.3-bp156.2.3.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "restic-zsh-completion-0.17.3-bp156.2.3.1.noarch as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:restic-zsh-completion-0.17.3-bp156.2.3.1.noarch"
        },
        "product_reference": "restic-zsh-completion-0.17.3-bp156.2.3.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-22868",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-22868"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.aarch64",
          "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.i586",
          "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.ppc64le",
          "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.s390x",
          "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.x86_64",
          "SUSE Package Hub 15 SP6:restic-bash-completion-0.17.3-bp156.2.3.1.noarch",
          "SUSE Package Hub 15 SP6:restic-zsh-completion-0.17.3-bp156.2.3.1.noarch",
          "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.aarch64",
          "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.i586",
          "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.ppc64le",
          "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.s390x",
          "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.x86_64",
          "openSUSE Leap 15.6:restic-bash-completion-0.17.3-bp156.2.3.1.noarch",
          "openSUSE Leap 15.6:restic-zsh-completion-0.17.3-bp156.2.3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-22868",
          "url": "https://www.suse.com/security/cve/CVE-2025-22868"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239185 for CVE-2025-22868",
          "url": "https://bugzilla.suse.com/1239185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239186 for CVE-2025-22868",
          "url": "https://bugzilla.suse.com/1239186"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.aarch64",
            "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.i586",
            "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.ppc64le",
            "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.s390x",
            "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.x86_64",
            "SUSE Package Hub 15 SP6:restic-bash-completion-0.17.3-bp156.2.3.1.noarch",
            "SUSE Package Hub 15 SP6:restic-zsh-completion-0.17.3-bp156.2.3.1.noarch",
            "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.aarch64",
            "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.i586",
            "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.ppc64le",
            "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.s390x",
            "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.x86_64",
            "openSUSE Leap 15.6:restic-bash-completion-0.17.3-bp156.2.3.1.noarch",
            "openSUSE Leap 15.6:restic-zsh-completion-0.17.3-bp156.2.3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.aarch64",
            "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.i586",
            "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.ppc64le",
            "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.s390x",
            "SUSE Package Hub 15 SP6:restic-0.17.3-bp156.2.3.1.x86_64",
            "SUSE Package Hub 15 SP6:restic-bash-completion-0.17.3-bp156.2.3.1.noarch",
            "SUSE Package Hub 15 SP6:restic-zsh-completion-0.17.3-bp156.2.3.1.noarch",
            "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.aarch64",
            "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.i586",
            "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.ppc64le",
            "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.s390x",
            "openSUSE Leap 15.6:restic-0.17.3-bp156.2.3.1.x86_64",
            "openSUSE Leap 15.6:restic-bash-completion-0.17.3-bp156.2.3.1.noarch",
            "openSUSE Leap 15.6:restic-zsh-completion-0.17.3-bp156.2.3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-15T11:01:16Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-22868"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…