Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security [Unknown] CVE-2025-22866 #201

Open
upbound-bot opened this issue Feb 10, 2025 · 0 comments
Open

Security [Unknown] CVE-2025-22866 #201

upbound-bot opened this issue Feb 10, 2025 · 0 comments

Comments

@upbound-bot
Copy link

Vulnerability Details

  • ID: CVE-2025-22866
  • Severity: Unknown
  • Affected Provider Version: ['v1.6.2', 'v1.5.2', 'v1.4.3', 'v1.3.2']
  • Package: stdlib
  • Package Version: go1.23.2
  • Type: go-module
  • Description: Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.
  • Fix State: fixed
  • Fix Versions: 1.22.12, 1.23.6, 1.24.0-rc.3
  • Artifact Paths: /usr/local/bin/provider
  • More Info: https://go.dev/cl/643735, https://go.dev/issue/71383, https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k, https://pkg.go.dev/vuln/GO-2025-3447

This vulnerability was detected during the periodic CVE scan.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants