[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3327-1] nss security update

Debian LTS Advisory DLA-3327-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Markus Koschany
February 20, 2023                             https://wiki.debian.org/LTS

Package        : nss
Version        : 2:3.42.1-1+deb10u6
CVE ID         : CVE-2020-6829 CVE-2020-12400 CVE-2020-12401 CVE-2020-12403 

Multiple security vulnerabilities have been discovered in nss, the Network
Security Service libraries. 


    When performing EC scalar point multiplication, the wNAF point
    multiplication algorithm was used; which leaked partial information about
    the nonce used during signature generation. Given an electro-magnetic trace
    of a few signature generations, the private key could have been computed.


    When converting coordinates from projective to affine, the modular
    inversion was not performed in constant time, resulting in a possible
    timing-based side channel attack.


    During ECDSA signature generation, padding applied in the nonce designed to
    ensure constant-time scalar multiplication was removed, resulting in
    variable-time execution dependent on secret data.


    A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS.
    When using multi-part Chacha20, it could cause out-of-bounds reads.
    This issue was fixed by explicitly disabling multi-part ChaCha20 
    (which was not functioning correctly) and strictly enforcing tag length.


    Christian Holler discovered that incorrect handling of PKCS 12 Safe Bag
    attributes may result in execution of arbitrary code if a specially crafted
    PKCS 12 certificate bundle is processed.

For Debian 10 buster, these problems have been fixed in version

We recommend that you upgrade your nss packages.

For the detailed security status of nss please refer to
its security tracker page at:

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: This is a digitally signed message part

Reply to: