--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2025-6495526449
2025-12-03 00:26:41.875099+00:00
--------------------------------------------------------------------------------

Name        : restic
Product     : Fedora EPEL 9
Version     : 0.18.1
Release     : 1.el9
URL         : https://github.com/restic/restic
Summary     : Fast, secure, efficient backup program
Description :
Fast, secure, efficient backup program.

restic supports the following backends for storing backups natively:

* Local directory
* sftp server (via SSH)
* HTTP REST server (protocol, rest-server)
* Amazon S3 (either from Amazon or using the Minio server)
* OpenStack Swift
* BackBlaze B2
* Microsoft Azure Blob Storage
* Google Cloud Storage
* And many other services via the rclone Backend

--------------------------------------------------------------------------------
Update Information:

Update to 0.18.1
--------------------------------------------------------------------------------
ChangeLog:

* Mon Nov 24 2025 Mikel Olasagasti Uranga <[email protected]> - 0.18.1-1
- Update to 0.18.1 - Closes rhbz#2397204 rhbz2416773
* Mon Jul 28 2025 Mikel Olasagasti Uranga <[email protected]> - 0.18.0-5
- Clean up: Remove files not present in rawhide
* Mon Jul 28 2025 Mikel Olasagasti Uranga <[email protected]> - 0.18.0-4
- RPMAUTOSPEC: unresolvable merge
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2214190 - Please update restic to newest version
        https://bugzilla.redhat.com/show_bug.cgi?id=2214190
  [ 2 ] Bug #2272498 - restic package is out of date
        https://bugzilla.redhat.com/show_bug.cgi?id=2272498
  [ 3 ] Bug #2331936 - CVE-2024-45337 restic: Misuse of 
ServerConfig.PublicKeyCallback may cause authorization bypass in 
golang.org/x/crypto [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2331936
  [ 4 ] Bug #2348791 - CVE-2025-22868 restic: Unexpected memory consumption 
during token parsing in golang.org/x/oauth2 [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2348791
  [ 5 ] Bug #2350765 - CVE-2025-22869 restic: Denial of Service in the Key 
Exchange of golang.org/x/crypto/ssh [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2350765
  [ 6 ] Bug #2351908 - CVE-2025-22870 restic: HTTP Proxy bypass using IPv6 Zone 
IDs in golang.org/x/net [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2351908
  [ 7 ] Bug #2398374 - CVE-2025-47910 restic: CrossOriginProtection bypass in 
net/http [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2398374
  [ 8 ] Bug #2399024 - CVE-2025-47906 restic: Unexpected paths returned from 
LookPath in os/exec [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2399024
  [ 9 ] Bug #2407561 - CVE-2025-58189 restic: go crypto/tls ALPN negotiation 
error contains attacker controlled information [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2407561
  [ 10 ] Bug #2409015 - CVE-2025-61723 restic: Quadratic complexity when 
parsing some invalid inputs in encoding/pem [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2409015
  [ 11 ] Bug #2409962 - CVE-2025-58185 restic: Parsing DER payload can cause 
memory exhaustion in encoding/asn1 [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2409962
  [ 12 ] Bug #2410895 - CVE-2025-58188 restic: Panic when validating 
certificates with DSA public keys in crypto/x509 [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2410895
  [ 13 ] Bug #2412495 - CVE-2025-58183 restic: Unbounded allocation when 
parsing GNU sparse map [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2412495
--------------------------------------------------------------------------------

This update can be installed with the "yum" update programs.  Use
su -c 'yum update restic' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\
/html/System_Administrators_Guide/ch-yum.html

All packages are signed with the Fedora EPEL GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
epel-package-announce mailing list -- 
[email protected]
To unsubscribe send an email to 
[email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to