-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2025-817b0dc707 2025-11-22 01:28:46.754169+00:00 --------------------------------------------------------------------------------
Name : gopass Product : Fedora 43 Version : 1.16.0 Release : 1.fc43 URL : https://github.com/gopasspw/gopass Summary : The slightly more awesome standard unix password manager for teams Description : The slightly more awesome standard unix password manager for teams. -------------------------------------------------------------------------------- Update Information: Update to 1.16.0 -------------------------------------------------------------------------------- ChangeLog: * Thu Nov 13 2025 Fabio Alessandro Locati <[email protected]> - 1.16.0-1 - Update to 1.16.0 * Fri Oct 10 2025 Alejandro Sáez <[email protected]> - 1.15.18-2 - rebuild -------------------------------------------------------------------------------- References: [ 1 ] Bug #2385032 - gopass: FTBFS in Fedora rawhide/f43 https://bugzilla.redhat.com/show_bug.cgi?id=2385032 [ 2 ] Bug #2407760 - CVE-2025-58189 gopass: go crypto/tls ALPN negotiation error contains attacker controlled information [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2407760 [ 3 ] Bug #2408029 - CVE-2025-58189 gopass: go crypto/tls ALPN negotiation error contains attacker controlled information [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2408029 [ 4 ] Bug #2408287 - CVE-2025-58189 gopass: go crypto/tls ALPN negotiation error contains attacker controlled information [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2408287 [ 5 ] Bug #2409210 - CVE-2025-61723 gopass: Quadratic complexity when parsing some invalid inputs in encoding/pem [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2409210 [ 6 ] Bug #2409497 - CVE-2025-61723 gopass: Quadratic complexity when parsing some invalid inputs in encoding/pem [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2409497 [ 7 ] Bug #2409760 - CVE-2025-61723 gopass: Quadratic complexity when parsing some invalid inputs in encoding/pem [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2409760 [ 8 ] Bug #2410174 - CVE-2025-58185 gopass: Parsing DER payload can cause memory exhaustion in encoding/asn1 [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2410174 [ 9 ] Bug #2410448 - CVE-2025-58185 gopass: Parsing DER payload can cause memory exhaustion in encoding/asn1 [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2410448 [ 10 ] Bug #2410710 - CVE-2025-58185 gopass: Parsing DER payload can cause memory exhaustion in encoding/asn1 [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2410710 [ 11 ] Bug #2411088 - CVE-2025-58188 gopass: Panic when validating certificates with DSA public keys in crypto/x509 [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2411088 [ 12 ] Bug #2411347 - CVE-2025-58188 gopass: Panic when validating certificates with DSA public keys in crypto/x509 [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2411347 [ 13 ] Bug #2411606 - CVE-2025-58188 gopass: Panic when validating certificates with DSA public keys in crypto/x509 [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2411606 [ 14 ] Bug #2412555 - CVE-2025-58183 gopass: Unbounded allocation when parsing GNU sparse map [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2412555 [ 15 ] Bug #2412706 - CVE-2025-58183 gopass: Unbounded allocation when parsing GNU sparse map [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2412706 [ 16 ] Bug #2412788 - CVE-2025-58183 gopass: Unbounded allocation when parsing GNU sparse map [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2412788 [ 17 ] Bug #2414901 - gopass-1.16.0 is available https://bugzilla.redhat.com/show_bug.cgi?id=2414901 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2025-817b0dc707' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------
-- _______________________________________________ package-announce mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
