Metrics
Affected Vendors & Products
Fri, 14 Mar 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat openshift Distributed Tracing |
|
CPEs | cpe:/a:redhat:openshift_distributed_tracing:3.5::el8 | |
Vendors & Products |
Redhat
Redhat openshift Distributed Tracing |
Fri, 21 Feb 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 11 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 10 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
ssvc
|
Sat, 08 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 06 Feb 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols. | |
Title | Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec | |
References |
|

Status: PUBLISHED
Assigner: Go
Published: 2025-02-06T16:54:10.252Z
Updated: 2025-02-21T18:03:36.215Z
Reserved: 2025-01-08T19:11:42.834Z
Link: CVE-2025-22866

Updated: 2025-02-21T18:03:36.215Z

Status : Awaiting Analysis
Published: 2025-02-06T17:15:21.410
Modified: 2025-02-21T18:15:32.243
Link: CVE-2025-22866
