Information Exposure Affecting golang package, versions <0:1.23.6-2.el9_5


Severity

Recommended
high

Based on CentOS security rating.

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS9-GOLANG-8851998
  • published28 Feb 2025
  • disclosed6 Feb 2025

Introduced: 6 Feb 2025

CVE-2025-22866  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade Centos:9 golang to version 0:1.23.6-2.el9_5 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream golang package and not the golang package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.

CVSS Base Scores

version 3.1