Bug 2344219 (CVE-2025-22866)
Summary: | CVE-2025-22866 crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aazores, abrianik, adistefa, akostadi, alcohan, amasferr, amctagga, anjoseph, ansmith, anthomas, aoconnor, asatyam, bdettelb, bkabrda, bniver, brking, cbartlet, chazlett, ckandaga, cmah, crizzo, danken, debarshir, dhanak, diagrawa, dmayorov, doconnor, dsimansk, dymurray, eaguilar, ebaron, eglynn, ehelms, fdeutsch, flucifre, ggainey, ggrzybek, gkamathe, gmeno, gparvin, haoli, hkataria, ibolton, jaharrin, jajackso, jburrell, jcammara, jcantril, jeder, jforrest, jjoyce, jkoehler, jlledo, jmatthew, jmitchel, jmontleo, jneedle, jolong, jprabhak, jschluet, juwatts, jwendell, kegrant, kingland, koliveir, kshier, kverlaen, lball, lchilton, lgamliel, lhh, lphiri, lsvaty, mabashia, manissin, matzew, mbenjamin, mbocek, mburns, mgarciac, mhackett, mhulan, mkudlej, mmakovy, mnovotny, mrunge, mwringe, ngough, njean, nmoumoul, nobody, oramraz, osousa, owatkins, pahickey, parichar, pbraun, pcreech, peholase, pgaikwad, pgrist, pierdipi, pjindal, pvasanth, rcernich, rchan, rfreiman, rguimara, rhaigner, rhuss, rjohnson, rojacob, sabiswas, sakbas, saroy, sausingh, sdawley, sfeifer, sfroberg, shvarugh, simaishi, slucidi, smallamp, smcdonal, smullick, sostapov, sseago, stcannon, stirabos, tasato, teagle, tfister, thason, thavo, tjochec, vereddy, veshanka, vimartin, whayutin, wtam, yguenane |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2344501, 2344502, 2344503, 2344504, 2350500 | ||
Bug Blocks: |
Description
OSIDB Bzimport
2025-02-06 17:01:18 UTC
After a little bit of Git archaeology, I found that this was fixed in Go 1.22.12 with: https://github.com/golang/go/commit/0cc45e7ca668b103 ... and in Go 1.23.5 with: https://github.com/golang/go/commit/6644ed63b1e6ccc1 (In reply to Debarshi Ray from comment #4) > ... and in Go 1.23.5 with: > https://github.com/golang/go/commit/6644ed63b1e6ccc1 Sorry, this was 1.23.6. This issue has been addressed in the following products: Red Hat OpenShift Service Mesh 2.5 for RHEL 8 Via RHSA-2025:3922 https://access.redhat.com/errata/RHSA-2025:3922 This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9 Via RHSA-2025:4810 https://access.redhat.com/errata/RHSA-2025:4810 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:7326 https://access.redhat.com/errata/RHSA-2025:7326 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:7466 https://access.redhat.com/errata/RHSA-2025:7466 This issue has been addressed in the following products: HawtIO HawtIO 4.2.0 Via RHSA-2025:8761 https://access.redhat.com/errata/RHSA-2025:8761 |