CVE-2025-22866

NameCVE-2025-22866
DescriptionDue to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-1.15 (PTS)bullseye1.15.15-1~deb11u4vulnerable
golang-1.19 (PTS)bookworm1.19.8-2vulnerable
golang-1.22 (PTS)trixie1.22.11-1vulnerable
sid1.22.12-3fixed
golang-1.23 (PTS)trixie1.23.5-1vulnerable
sid1.23.6-3fixed
golang-1.24 (PTS)trixie1.24~rc2-1vulnerable
sid1.24.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-1.15source(unstable)(unfixed)
golang-1.19source(unstable)(unfixed)
golang-1.22source(unstable)1.22.12-1
golang-1.23source(unstable)1.23.6-1
golang-1.24source(unstable)1.24~rc3-1

Notes

[bullseye] - golang-1.15 <ignored> (Minor issue)
https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k
https://github.com/golang/go/issues/71383
https://github.com/golang/go/commit/6fc23a3cff5e38ff72923fee50f51254dcdc6e93 (go1.24rc3)
https://github.com/golang/go/commit/6644ed63b1e6ccc129647ef6b0d4647fdbe14056 (go1.23.6)
https://github.com/golang/go/commit/0cc45e7ca668b103c1055ae84402ad3f3425dd56 (go1.22.12)

Search for package or bug name: Reporting problems