Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package gotosocial for openSUSE:Factory 
checked in at 2025-04-02 17:15:31
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/gotosocial (Old)
 and      /work/SRC/openSUSE:Factory/.gotosocial.new.1907 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "gotosocial"

Wed Apr  2 17:15:31 2025 rev:5 rq:1266282 version:0.18.3

Changes:
--------
--- /work/SRC/openSUSE:Factory/gotosocial/gotosocial.changes    2025-03-25 
22:17:28.279191654 +0100
+++ /work/SRC/openSUSE:Factory/.gotosocial.new.1907/gotosocial.changes  
2025-04-02 17:17:26.499615330 +0200
@@ -1,0 +2,6 @@
+Tue Apr  1 15:57:46 UTC 2025 - Flann van der Eik <fl...@posteo.de>
+
+- Backport golang-jwt version bump (bsc#1240492, CVE-2025-30204)
+  by adding bump_jwt.patch
+
+-------------------------------------------------------------------

New:
----
  bump_jwt.patch

BETA DEBUG BEGIN:
  New:- Backport golang-jwt version bump (bsc#1240492, CVE-2025-30204)
  by adding bump_jwt.patch
BETA DEBUG END:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ gotosocial.spec ++++++
--- /var/tmp/diff_new_pack.xr7guK/_old  2025-04-02 17:17:27.831671223 +0200
+++ /var/tmp/diff_new_pack.xr7guK/_new  2025-04-02 17:17:27.831671223 +0200
@@ -28,6 +28,8 @@
 Source2:        vendor_yarn.sh
 Source3:        gotosocial.sysusers
 Patch0:         default-settings.patch
+# PATCH-FIX-UPSTREAM: Bump golang-jwt (bsc#1240492)
+Patch1:         bump_jwt.patch
 BuildRequires:  apparmor-profiles
 BuildRequires:  apparmor-rpm-macros
 BuildRequires:  golang-packaging

++++++ bump_jwt.patch ++++++
>From 4af8d1a2cb98ca39191e709d18519bc438153e12 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Mon, 24 Mar 2025 10:54:29 +0000
Subject: [PATCH] [chore]: Bump github.com/golang-jwt/jwt/v5 from 5.2.1 to
 5.2.2 (#3927)

Bumps [github.com/golang-jwt/jwt/v5](https://github.com/golang-jwt/jwt) from 
5.2.1 to 5.2.2.
- [Release notes](https://github.com/golang-jwt/jwt/releases)
- [Changelog](https://github.com/golang-jwt/jwt/blob/main/VERSION_HISTORY.md)
- [Commits](https://github.com/golang-jwt/jwt/compare/v5.2.1...v5.2.2)

---
updated-dependencies:
- dependency-name: github.com/golang-jwt/jwt/v5
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <supp...@github.com>
Co-authored-by: dependabot[bot] 
<49699333+dependabot[bot]@users.noreply.github.com>
---
 go.mod                                        |  2 +-
 go.sum                                        |  3 +-
 vendor/github.com/golang-jwt/jwt/v5/README.md | 16 ++++-----
 .../github.com/golang-jwt/jwt/v5/SECURITY.md  |  4 +--
 vendor/github.com/golang-jwt/jwt/v5/parser.go | 36 +++++++++++++++++--
 vendor/github.com/golang-jwt/jwt/v5/token.go  |  2 +-
 vendor/modules.txt                            |  2 +-
 7 files changed, 48 insertions(+), 17 deletions(-)

diff --git a/go.mod b/go.mod
index 33b43dab49..194319334b 100644
--- a/go.mod
+++ b/go.mod
@@ -144,7 +144,7 @@ require (
        github.com/go-xmlfmt/xmlfmt v0.0.0-20191208150333-d5b6f63a941b // 
indirect
        github.com/goccy/go-json v0.10.5 // indirect
        github.com/golang-jwt/jwt v3.2.2+incompatible // indirect
-       github.com/golang-jwt/jwt/v5 v5.2.1 // indirect
+       github.com/golang-jwt/jwt/v5 v5.2.2 // indirect
        github.com/golang/geo v0.0.0-20200319012246-673a6f80352d // indirect
        github.com/gorilla/context v1.1.2 // indirect
        github.com/gorilla/css v1.0.1 // indirect
diff --git a/go.sum b/go.sum
index 7b24221178..64eeac8ae4 100644
--- a/go.sum
+++ b/go.sum
@@ -241,8 +241,9 @@ github.com/goccy/go-json v0.10.5/go.mod
 github.com/golang-jwt/jwt v3.2.1+incompatible/go.mod 
h1:8pz2t5EyA70fFQQSrl6XZXzqecmYZeUEB8OUGHkxJ+I=
 github.com/golang-jwt/jwt v3.2.2+incompatible 
h1:IfV12K8xAKAnZqdXVzCZ+TOjboZ2keLg81eXfW3O+oY=
 github.com/golang-jwt/jwt v3.2.2+incompatible/go.mod 
h1:8pz2t5EyA70fFQQSrl6XZXzqecmYZeUEB8OUGHkxJ+I=
-github.com/golang-jwt/jwt/v5 v5.2.1 
h1:OuVbFODueb089Lh128TAcimifWaLhJwVflnrgM17wHk=
 github.com/golang-jwt/jwt/v5 v5.2.1/go.mod 
h1:pqrtFR0X4osieyHYxtmOUWsAWrfe1Q5UVIyoH402zdk=
+github.com/golang-jwt/jwt/v5 v5.2.2 
h1:Rl4B7itRWVtYIHFrSNd7vhTiz9UpLdi6gZhZ3wEeDy8=
+github.com/golang-jwt/jwt/v5 v5.2.2/go.mod 
h1:pqrtFR0X4osieyHYxtmOUWsAWrfe1Q5UVIyoH402zdk=
 github.com/golang/geo v0.0.0-20190916061304-5b978397cfec/go.mod 
h1:QZ0nwyI2jOfgRAoBvP+ab5aRr7c9x7lhGEJrKvBwjWI=
 github.com/golang/geo v0.0.0-20200319012246-673a6f80352d 
h1:C/hKUcHT483btRbeGkrRjJz+Zbcj8audldIi9tRJDCc=
 github.com/golang/geo v0.0.0-20200319012246-673a6f80352d/go.mod 
h1:QZ0nwyI2jOfgRAoBvP+ab5aRr7c9x7lhGEJrKvBwjWI=
diff --git a/vendor/github.com/golang-jwt/jwt/v5/README.md 
b/vendor/github.com/golang-jwt/jwt/v5/README.md
index 964598a317..0bb636f222 100644
--- a/vendor/github.com/golang-jwt/jwt/v5/README.md
+++ b/vendor/github.com/golang-jwt/jwt/v5/README.md
@@ -10,11 +10,11 @@ implementation of [JSON Web
 Tokens](https://datatracker.ietf.org/doc/html/rfc7519).
 
 Starting with [v4.0.0](https://github.com/golang-jwt/jwt/releases/tag/v4.0.0)
-this project adds Go module support, but maintains backwards compatibility with
+this project adds Go module support, but maintains backward compatibility with
 older `v3.x.y` tags and upstream `github.com/dgrijalva/jwt-go`. See the
 [`MIGRATION_GUIDE.md`](./MIGRATION_GUIDE.md) for more information. Version
 v5.0.0 introduces major improvements to the validation of tokens, but is not
-entirely backwards compatible. 
+entirely backward compatible. 
 
 > After the original author of the library suggested migrating the maintenance
 > of `jwt-go`, a dedicated team of open source maintainers decided to clone the
@@ -24,7 +24,7 @@ entirely backwards compatible.
 
 
 **SECURITY NOTICE:** Some older versions of Go have a security issue in the
-crypto/elliptic. Recommendation is to upgrade to at least 1.15 See issue
+crypto/elliptic. The recommendation is to upgrade to at least 1.15 See issue
 [dgrijalva/jwt-go#216](https://github.com/dgrijalva/jwt-go/issues/216) for more
 detail.
 
@@ -32,7 +32,7 @@ detail.
 what you
 
expect](https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/).
 This library attempts to make it easy to do the right thing by requiring key
-types match the expected alg, but you should take the extra step to verify it 
in
+types to match the expected alg, but you should take the extra step to verify 
it in
 your usage.  See the examples provided.
 
 ### Supported Go versions
@@ -41,7 +41,7 @@ Our support of Go versions is aligned with Go's [version 
release
 policy](https://golang.org/doc/devel/release#policy). So we will support a 
major
 version of Go until there are two newer major releases. We no longer support
 building jwt-go with unsupported Go versions, as these contain security
-vulnerabilities which will not be fixed.
+vulnerabilities that will not be fixed.
 
 ## What the heck is a JWT?
 
@@ -117,7 +117,7 @@ notable differences:
 
 This library is considered production ready.  Feedback and feature requests are
 appreciated.  The API should be considered stable.  There should be very few
-backwards-incompatible changes outside of major version updates (and only with
+backward-incompatible changes outside of major version updates (and only with
 good reason).
 
 This project uses [Semantic Versioning 2.0.0](http://semver.org).  Accepted 
pull
@@ -125,8 +125,8 @@ requests will land on `main`.  Periodically, versions will 
be tagged from
 `main`.  You can find all the releases on [the project releases
 page](https://github.com/golang-jwt/jwt/releases).
 
-**BREAKING CHANGES:*** A full list of breaking changes is available in
-`VERSION_HISTORY.md`.  See `MIGRATION_GUIDE.md` for more information on 
updating
+**BREAKING CHANGES:** A full list of breaking changes is available in
+`VERSION_HISTORY.md`.  See [`MIGRATION_GUIDE.md`](./MIGRATION_GUIDE.md) for 
more information on updating
 your code.
 
 ## Extensions
diff --git a/vendor/github.com/golang-jwt/jwt/v5/SECURITY.md 
b/vendor/github.com/golang-jwt/jwt/v5/SECURITY.md
index b08402c342..2740597f17 100644
--- a/vendor/github.com/golang-jwt/jwt/v5/SECURITY.md
+++ b/vendor/github.com/golang-jwt/jwt/v5/SECURITY.md
@@ -2,11 +2,11 @@
 
 ## Supported Versions
 
-As of February 2022 (and until this document is updated), the latest version 
`v4` is supported.
+As of November 2024 (and until this document is updated), the latest version 
`v5` is supported. In critical cases, we might supply back-ported patches for 
`v4`.
 
 ## Reporting a Vulnerability
 
-If you think you found a vulnerability, and even if you are not sure, please 
report it to jwt-go-secur...@googlegroups.com or one of the other [golang-jwt 
maintainers](https://github.com/orgs/golang-jwt/people). Please try be 
explicit, describe steps to reproduce the security issue with code example(s).
+If you think you found a vulnerability, and even if you are not sure, please 
report it a [GitHub Security 
Advisory](https://github.com/golang-jwt/jwt/security/advisories/new). Please 
try be explicit, describe steps to reproduce the security issue with code 
example(s).
 
 You will receive a response within a timely manner. If the issue is confirmed, 
we will do our best to release a patch as soon as possible given the complexity 
of the problem.
 
diff --git a/vendor/github.com/golang-jwt/jwt/v5/parser.go 
b/vendor/github.com/golang-jwt/jwt/v5/parser.go
index ecf99af78f..054c7eb6ff 100644
--- a/vendor/github.com/golang-jwt/jwt/v5/parser.go
+++ b/vendor/github.com/golang-jwt/jwt/v5/parser.go
@@ -8,6 +8,8 @@ import (
        "strings"
 )
 
+const tokenDelimiter = "."
+
 type Parser struct {
        // If populated, only these methods will be considered valid.
        validMethods []string
@@ -136,9 +138,10 @@ func (p *Parser) ParseWithClaims(tokenString string, 
claims Claims, keyFunc Keyf
 // It's only ever useful in cases where you know the signature is valid (since 
it has already
 // been or will be checked elsewhere in the stack) and you want to extract 
values from it.
 func (p *Parser) ParseUnverified(tokenString string, claims Claims) (token 
*Token, parts []string, err error) {
-       parts = strings.Split(tokenString, ".")
-       if len(parts) != 3 {
-               return nil, parts, newError("token contains an invalid number 
of segments", ErrTokenMalformed)
+       var ok bool
+       parts, ok = splitToken(tokenString)
+       if !ok {
+               return nil, nil, newError("token contains an invalid number of 
segments", ErrTokenMalformed)
        }
 
        token = &Token{Raw: tokenString}
@@ -196,6 +199,33 @@ func (p *Parser) ParseUnverified(tokenString string, 
claims Claims) (token *Toke
        return token, parts, nil
 }
 
+// splitToken splits a token string into three parts: header, claims, and 
signature. It will only
+// return true if the token contains exactly two delimiters and three parts. 
In all other cases, it
+// will return nil parts and false.
+func splitToken(token string) ([]string, bool) {
+       parts := make([]string, 3)
+       header, remain, ok := strings.Cut(token, tokenDelimiter)
+       if !ok {
+               return nil, false
+       }
+       parts[0] = header
+       claims, remain, ok := strings.Cut(remain, tokenDelimiter)
+       if !ok {
+               return nil, false
+       }
+       parts[1] = claims
+       // One more cut to ensure the signature is the last part of the token 
and there are no more
+       // delimiters. This avoids an issue where malicious input could contain 
additional delimiters
+       // causing unecessary overhead parsing tokens.
+       signature, _, unexpected := strings.Cut(remain, tokenDelimiter)
+       if unexpected {
+               return nil, false
+       }
+       parts[2] = signature
+
+       return parts, true
+}
+
 // DecodeSegment decodes a JWT specific base64url encoding. This function will
 // take into account whether the [Parser] is configured with additional 
options,
 // such as [WithStrictDecoding] or [WithPaddingAllowed].
diff --git a/vendor/github.com/golang-jwt/jwt/v5/token.go 
b/vendor/github.com/golang-jwt/jwt/v5/token.go
index 352873a2d9..9c7f4ab010 100644
--- a/vendor/github.com/golang-jwt/jwt/v5/token.go
+++ b/vendor/github.com/golang-jwt/jwt/v5/token.go
@@ -75,7 +75,7 @@ func (t *Token) SignedString(key interface{}) (string, error) 
{
 }
 
 // SigningString generates the signing string.  This is the most expensive part
-// of the whole deal.  Unless you need this for something special, just go
+// of the whole deal. Unless you need this for something special, just go
 // straight for the SignedString.
 func (t *Token) SigningString() (string, error) {
        h, err := json.Marshal(t.Header)
diff --git a/vendor/modules.txt b/vendor/modules.txt
index 5380d38dcb..0f05b64e17 100644
--- a/vendor/modules.txt
+++ b/vendor/modules.txt
@@ -514,7 +514,7 @@ github.com/goccy/go-json/internal/runtime
 # github.com/golang-jwt/jwt v3.2.2+incompatible
 ## explicit
 github.com/golang-jwt/jwt
-# github.com/golang-jwt/jwt/v5 v5.2.1
+# github.com/golang-jwt/jwt/v5 v5.2.2
 ## explicit; go 1.18
 github.com/golang-jwt/jwt/v5
 # github.com/golang/geo v0.0.0-20200319012246-673a6f80352d

Reply via email to