Bug 2344219 (CVE-2025-22866)

Summary: CVE-2025-22866 crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aazores, abrianik, adistefa, akostadi, alcohan, amasferr, amctagga, anjoseph, ansmith, anthomas, aoconnor, asatyam, bdettelb, bkabrda, bniver, brking, cbartlet, chazlett, ckandaga, cmah, crizzo, danken, debarshir, dhanak, diagrawa, dmayorov, doconnor, dsimansk, dymurray, eaguilar, ebaron, eglynn, ehelms, fdeutsch, flucifre, ggainey, ggrzybek, gkamathe, gmeno, gparvin, haoli, hkataria, ibolton, jaharrin, jajackso, jburrell, jcammara, jcantril, jeder, jforrest, jjoyce, jkoehler, jlledo, jmatthew, jmitchel, jmontleo, jneedle, jolong, jprabhak, jschluet, juwatts, jwendell, kegrant, kingland, koliveir, kshier, kverlaen, lball, lchilton, lgamliel, lhh, lphiri, lsvaty, mabashia, manissin, matzew, mbenjamin, mbocek, mburns, mgarciac, mhackett, mhulan, mkudlej, mmakovy, mnovotny, mrunge, mwringe, ngough, njean, nmoumoul, nobody, oramraz, osousa, owatkins, pahickey, parichar, pbraun, pcreech, peholase, pgaikwad, pgrist, pierdipi, pjindal, pvasanth, rcernich, rchan, rfreiman, rguimara, rhaigner, rhuss, rjohnson, rojacob, sabiswas, sakbas, saroy, sausingh, sdawley, sfeifer, sfroberg, shvarugh, simaishi, slucidi, smallamp, smcdonal, smullick, sostapov, sseago, stcannon, stirabos, tasato, teagle, tfister, thason, thavo, tjochec, vereddy, veshanka, vimartin, whayutin, wtam, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2344501, 2344502, 2344503, 2344504, 2350500    
Bug Blocks:    

Description OSIDB Bzimport 2025-02-06 17:01:18 UTC
Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.

Comment 4 Debarshi Ray 2025-03-06 14:54:35 UTC
After a little bit of Git archaeology, I found that this was fixed in Go 1.22.12 with:
https://github.com/golang/go/commit/0cc45e7ca668b103

... and in Go 1.23.5 with:
https://github.com/golang/go/commit/6644ed63b1e6ccc1

Comment 5 Debarshi Ray 2025-03-06 14:55:39 UTC
(In reply to Debarshi Ray from comment #4)
> ... and in Go 1.23.5 with:
> https://github.com/golang/go/commit/6644ed63b1e6ccc1

Sorry, this was 1.23.6.

Comment 8 errata-xmlrpc 2025-04-15 17:24:33 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Service Mesh 2.5 for RHEL 8

Via RHSA-2025:3922 https://access.redhat.com/errata/RHSA-2025:3922

Comment 13 errata-xmlrpc 2025-05-12 15:06:17 UTC
This issue has been addressed in the following products:

  Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9

Via RHSA-2025:4810 https://access.redhat.com/errata/RHSA-2025:4810

Comment 14 errata-xmlrpc 2025-05-13 10:36:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:7326 https://access.redhat.com/errata/RHSA-2025:7326

Comment 15 errata-xmlrpc 2025-05-13 15:56:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:7466 https://access.redhat.com/errata/RHSA-2025:7466

Comment 17 errata-xmlrpc 2025-06-10 10:39:48 UTC
This issue has been addressed in the following products:

  HawtIO HawtIO 4.2.0

Via RHSA-2025:8761 https://access.redhat.com/errata/RHSA-2025:8761