Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.
After a little bit of Git archaeology, I found that this was fixed in Go 1.22.12 with: https://github.com/golang/go/commit/0cc45e7ca668b103 ... and in Go 1.23.5 with: https://github.com/golang/go/commit/6644ed63b1e6ccc1
(In reply to Debarshi Ray from comment #4) > ... and in Go 1.23.5 with: > https://github.com/golang/go/commit/6644ed63b1e6ccc1 Sorry, this was 1.23.6.
This issue has been addressed in the following products: Red Hat OpenShift Service Mesh 2.5 for RHEL 8 Via RHSA-2025:3922 https://access.redhat.com/errata/RHSA-2025:3922
This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9 Via RHSA-2025:4810 https://access.redhat.com/errata/RHSA-2025:4810
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:7326 https://access.redhat.com/errata/RHSA-2025:7326
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:7466 https://access.redhat.com/errata/RHSA-2025:7466