Skip to content

Commit d9dd106

Browse files
committed
data/reports: add GO-2025-3447
- data/reports/GO-2025-3447.yaml Fixes #3447 Change-Id: I69d69ac7fc348d88f4d3f59d1b994249a5650a57 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/647256 Auto-Submit: Tatiana Bradley <[email protected]> Reviewed-by: Roland Shoemaker <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent b99ba05 commit d9dd106

File tree

3 files changed

+204
-0
lines changed

3 files changed

+204
-0
lines changed

data/cve/v5/GO-2025-3447.json

+88
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,88 @@
1+
{
2+
"dataType": "CVE_RECORD",
3+
"dataVersion": "5.0",
4+
"cveMetadata": {
5+
"cveId": "CVE-2025-22866"
6+
},
7+
"containers": {
8+
"cna": {
9+
"providerMetadata": {
10+
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
11+
},
12+
"title": "Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec",
13+
"descriptions": [
14+
{
15+
"lang": "en",
16+
"value": "Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols."
17+
}
18+
],
19+
"affected": [
20+
{
21+
"vendor": "Go standard library",
22+
"product": "crypto/internal/nistec",
23+
"collectionURL": "https://pkg.go.dev",
24+
"packageName": "crypto/internal/nistec",
25+
"versions": [
26+
{
27+
"version": "0",
28+
"lessThan": "1.22.12",
29+
"status": "affected",
30+
"versionType": "semver"
31+
},
32+
{
33+
"version": "1.23.0-0",
34+
"lessThan": "1.23.6",
35+
"status": "affected",
36+
"versionType": "semver"
37+
},
38+
{
39+
"version": "1.24.0-0",
40+
"lessThan": "1.24.0-rc.3",
41+
"status": "affected",
42+
"versionType": "semver"
43+
}
44+
],
45+
"programRoutines": [
46+
{
47+
"name": "p256NegCond"
48+
},
49+
{
50+
"name": "P256Point.ScalarBaseMult"
51+
},
52+
{
53+
"name": "P256Point.ScalarMult"
54+
},
55+
{
56+
"name": "P256Point.SetBytes"
57+
}
58+
],
59+
"defaultStatus": "unaffected"
60+
}
61+
],
62+
"problemTypes": [
63+
{
64+
"descriptions": [
65+
{
66+
"lang": "en",
67+
"description": "CWE-208: Observable Timing Discrepancy"
68+
}
69+
]
70+
}
71+
],
72+
"references": [
73+
{
74+
"url": "https://go.dev/cl/643735"
75+
},
76+
{
77+
"url": "https://go.dev/issue/71383"
78+
},
79+
{
80+
"url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k"
81+
},
82+
{
83+
"url": "https://pkg.go.dev/vuln/GO-2025-3447"
84+
}
85+
]
86+
}
87+
}
88+
}

data/osv/GO-2025-3447.json

+78
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2025-3447",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2025-22866"
8+
],
9+
"summary": "Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec",
10+
"details": "Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.",
11+
"affected": [
12+
{
13+
"package": {
14+
"name": "stdlib",
15+
"ecosystem": "Go"
16+
},
17+
"ranges": [
18+
{
19+
"type": "SEMVER",
20+
"events": [
21+
{
22+
"introduced": "0"
23+
},
24+
{
25+
"fixed": "1.22.12"
26+
},
27+
{
28+
"introduced": "1.23.0-0"
29+
},
30+
{
31+
"fixed": "1.23.6"
32+
},
33+
{
34+
"introduced": "1.24.0-0"
35+
},
36+
{
37+
"fixed": "1.24.0-rc.3"
38+
}
39+
]
40+
}
41+
],
42+
"ecosystem_specific": {
43+
"imports": [
44+
{
45+
"path": "crypto/internal/nistec",
46+
"goarch": [
47+
"ppc64le"
48+
],
49+
"symbols": [
50+
"P256Point.ScalarBaseMult",
51+
"P256Point.ScalarMult",
52+
"P256Point.SetBytes",
53+
"p256NegCond"
54+
]
55+
}
56+
]
57+
}
58+
}
59+
],
60+
"references": [
61+
{
62+
"type": "FIX",
63+
"url": "https://go.dev/cl/643735"
64+
},
65+
{
66+
"type": "REPORT",
67+
"url": "https://go.dev/issue/71383"
68+
},
69+
{
70+
"type": "WEB",
71+
"url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k"
72+
}
73+
],
74+
"database_specific": {
75+
"url": "https://pkg.go.dev/vuln/GO-2025-3447",
76+
"review_status": "REVIEWED"
77+
}
78+
}

data/reports/GO-2025-3447.yaml

+38
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
id: GO-2025-3447
2+
modules:
3+
- module: std
4+
versions:
5+
- fixed: 1.22.12
6+
- introduced: 1.23.0-0
7+
- fixed: 1.23.6
8+
- introduced: 1.24.0-0
9+
- fixed: 1.24.0-rc.3
10+
vulnerable_at: 1.23.1
11+
packages:
12+
- package: crypto/internal/nistec
13+
goarch:
14+
- ppc64le
15+
symbols:
16+
- p256NegCond
17+
derived_symbols:
18+
- P256Point.ScalarBaseMult
19+
- P256Point.ScalarMult
20+
- P256Point.SetBytes
21+
summary: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec
22+
description: |-
23+
Due to the usage of a variable time instruction in the assembly implementation
24+
of an internal function, a small number of bits of secret scalars are leaked on
25+
the ppc64le architecture. Due to the way this function is used, we do not
26+
believe this leakage is enough to allow recovery of the private key when P-256
27+
is used in any well known protocols.
28+
references:
29+
- fix: https://go.dev/cl/643735
30+
- report: https://go.dev/issue/71383
31+
- web: https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k
32+
cve_metadata:
33+
id: CVE-2025-22866
34+
cwe: 'CWE-208: Observable Timing Discrepancy'
35+
source:
36+
id: go-security-team
37+
created: 2025-02-06T10:27:04.033086-05:00
38+
review_status: REVIEWED

0 commit comments

Comments
 (0)