Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security [Unknown] CVE-2025-22866 #1681

Closed
upbound-bot opened this issue Feb 10, 2025 · 1 comment
Closed

Security [Unknown] CVE-2025-22866 #1681

upbound-bot opened this issue Feb 10, 2025 · 1 comment

Comments

@upbound-bot
Copy link

Vulnerability Details

  • ID: CVE-2025-22866
  • Severity: Unknown
  • Affected Provider Version: ['v1.17.2', 'v1.14.2', 'v1.9.2', 'v1.16.2', 'v1.20.0', 'v1.15.2', 'v1.12.0', 'v1.19.0', 'v1.13.3', 'v1.18.3']
  • Package: stdlib
  • Package Version: go1.23.3
  • Type: go-module
  • Description: Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.
  • Fix State: fixed
  • Fix Versions: 1.22.12, 1.23.6, 1.24.0-rc.3
  • Artifact Paths: /usr/local/bin/provider
  • More Info: https://go.dev/cl/643735, https://go.dev/issue/71383, https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k, https://pkg.go.dev/vuln/GO-2025-3447

This vulnerability was detected during the periodic CVE scan.

@sergenyalcin
Copy link
Collaborator

Addressed in the following releases:

  • v1.20.1
  • v1.19.1
  • v1.18.4
  • v1.17.3
  • v1.16.3
  • v1.15.3

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants