Source: gokey
Version: 0.1.2-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for gokey.

CVE-2025-13353[0]:
| In gokey versions <0.2.0,  a flaw in the seed decryption logic
| resulted in passwords incorrectly  being derived solely from the
| initial vector and the AES-GCM  authentication tag of the key seed.
| This issue has been fixed in gokey version 0.2.0. This is a breaking
| change. The fix has invalidated any passwords/secrets that were
| derived from the seed file (using the -s option). Even if the input
| seed file stays the same, version 0.2.0 gokey will generate
| different secrets.   Impact This vulnerability impacts generated
| keys/secrets using a seed file as an entropy input (using the -s
| option). Keys/secrets generated just from the master password
| (without the -s  option) are not impacted. The confidentiality of
| the seed itself is  also not impacted (it is not required to
| regenerate the seed itself).  Specific impact includes:      *
| keys/secrets generated from a seed file may have lower entropy: it
| was expected that the whole seed would be used to generate keys (240
| bytes of entropy input), where in vulnerable versions only 28 bytes
| was  used    *  a malicious entity could have recovered all
| passwords, generated  from a particular seed, having only the seed
| file in possession without  the knowledge of the seed master
| password     Patches The code logic bug has been fixed in gokey
| version 0.2.0  and above. Due to the deterministic nature of gokey,
| fixed versions  will produce different passwords/secrets using seed
| files, as all seed  entropy will be used now.   System secret
| rotation guidance It is advised for users to regenerate
| passwords/secrets using the patched version of gokey (0.2.0  and
| above), and provision/rotate these secrets into respective systems
| in place of the old secret. A specific rotation procedure is
| system-dependent, but most common patterns are described below.
| Systems that do not require the old password/secret for rotation
| Such systems usually have a "Forgot password" facility or a  similar
| facility allowing users to rotate their password/secrets by  sending
| a unique "magic" link to the user's email or phone. In such  cases
| users are advised to use this facility and input the newly
| generated password secret, when prompted by the system.   Systems
| that require the old password/secret for rotation Such systems
| usually have a modal password rotation window  usually in the user
| settings section requiring the user to input the  old and the new
| password sometimes with a confirmation. To  generate/recover the old
| password in such cases users are advised to:      *  temporarily
| download  gokey version 0.1.3
| https://github.com/cloudflare/gokey/releases/tag/v0.1.3  for their
| respective operating system to recover the old password    *  use
| gokey version 0.2.0 or above to generate the new password    *
| populate the system provided password rotation form     Systems that
| allow multiple credentials for the same account to be provisioned
| Such systems usually require a secret or a cryptographic  key as a
| credential for access, but allow several credentials at the  same
| time. One example is SSH: a particular user may have several
| authorized public keys configured on the SSH server for access. For
| such  systems users are advised to:      *  generate a new
| secret/key/credential using gokey version 0.2.0 or above    *
| provision the new secret/key/credential in addition to the existing
| credential on the system    *  verify that the access or required
| system operation is still possible with the new
| secret/key/credential    *  revoke authorization for the
| existing/old credential from the system     Credit This
| vulnerability was found by Théo Cusnir ( @mister_mime
| https://hackerone.com/mister_mime ) and responsibly disclosed
| through Cloudflare's bug bounty program.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-13353
    https://www.cve.org/CVERecord?id=CVE-2025-13353
[1] https://github.com/cloudflare/gokey/security/advisories/GHSA-69jw-4jj8-fcxm

Regards,
Salvatore

Reply via email to