--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2025-817b0dc707
2025-11-22 01:28:46.754169+00:00
--------------------------------------------------------------------------------

Name        : gopass
Product     : Fedora 43
Version     : 1.16.0
Release     : 1.fc43
URL         : https://github.com/gopasspw/gopass
Summary     : The slightly more awesome standard unix password manager for teams
Description :
The slightly more awesome standard unix password manager for teams.

--------------------------------------------------------------------------------
Update Information:

Update to 1.16.0
--------------------------------------------------------------------------------
ChangeLog:

* Thu Nov 13 2025 Fabio Alessandro Locati <[email protected]> - 1.16.0-1
- Update to 1.16.0
* Fri Oct 10 2025 Alejandro Sáez <[email protected]> - 1.15.18-2
- rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2385032 - gopass: FTBFS in Fedora rawhide/f43
        https://bugzilla.redhat.com/show_bug.cgi?id=2385032
  [ 2 ] Bug #2407760 - CVE-2025-58189 gopass: go crypto/tls ALPN negotiation 
error contains attacker controlled information [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2407760
  [ 3 ] Bug #2408029 - CVE-2025-58189 gopass: go crypto/tls ALPN negotiation 
error contains attacker controlled information [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2408029
  [ 4 ] Bug #2408287 - CVE-2025-58189 gopass: go crypto/tls ALPN negotiation 
error contains attacker controlled information [fedora-43]
        https://bugzilla.redhat.com/show_bug.cgi?id=2408287
  [ 5 ] Bug #2409210 - CVE-2025-61723 gopass: Quadratic complexity when parsing 
some invalid inputs in encoding/pem [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2409210
  [ 6 ] Bug #2409497 - CVE-2025-61723 gopass: Quadratic complexity when parsing 
some invalid inputs in encoding/pem [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2409497
  [ 7 ] Bug #2409760 - CVE-2025-61723 gopass: Quadratic complexity when parsing 
some invalid inputs in encoding/pem [fedora-43]
        https://bugzilla.redhat.com/show_bug.cgi?id=2409760
  [ 8 ] Bug #2410174 - CVE-2025-58185 gopass: Parsing DER payload can cause 
memory exhaustion in encoding/asn1 [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2410174
  [ 9 ] Bug #2410448 - CVE-2025-58185 gopass: Parsing DER payload can cause 
memory exhaustion in encoding/asn1 [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2410448
  [ 10 ] Bug #2410710 - CVE-2025-58185 gopass: Parsing DER payload can cause 
memory exhaustion in encoding/asn1 [fedora-43]
        https://bugzilla.redhat.com/show_bug.cgi?id=2410710
  [ 11 ] Bug #2411088 - CVE-2025-58188 gopass: Panic when validating 
certificates with DSA public keys in crypto/x509 [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2411088
  [ 12 ] Bug #2411347 - CVE-2025-58188 gopass: Panic when validating 
certificates with DSA public keys in crypto/x509 [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2411347
  [ 13 ] Bug #2411606 - CVE-2025-58188 gopass: Panic when validating 
certificates with DSA public keys in crypto/x509 [fedora-43]
        https://bugzilla.redhat.com/show_bug.cgi?id=2411606
  [ 14 ] Bug #2412555 - CVE-2025-58183 gopass: Unbounded allocation when 
parsing GNU sparse map [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2412555
  [ 15 ] Bug #2412706 - CVE-2025-58183 gopass: Unbounded allocation when 
parsing GNU sparse map [fedora-43]
        https://bugzilla.redhat.com/show_bug.cgi?id=2412706
  [ 16 ] Bug #2412788 - CVE-2025-58183 gopass: Unbounded allocation when 
parsing GNU sparse map [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2412788
  [ 17 ] Bug #2414901 - gopass-1.16.0 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=2414901
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2025-817b0dc707' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to