First published: Thu Feb 06 2025(Updated: )
Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-22866 is currently assessed to be low, as the bit leakage is not sufficient for recovery of secret scalars.
To mitigate CVE-2025-22866, it is recommended to update to the latest version of the affected software where the vulnerability has been addressed.
CVE-2025-22866 causes a small number of bits of secret scalars to be leaked, which may affect the security of applications running on the ppc64le architecture.
CVE-2025-22866 is specific to certain versions of the software that utilize the vulnerable assembly function; it is essential to check your version for exposure.
Regularly updating software and monitoring for security patches can help protect against CVE-2025-22866 and similar vulnerabilities.