CVE-2020-12402

Priority
Description
During RSA key generation, bignum implementations used a variation of the
Binary Extended Euclidean Algorithm which entailed significantly
input-dependent flow. This allowed an attacker able to perform
electromagnetic-based side channel attacks to record traces leading to the
recovery of the secret primes. *Note:* An unmodified Firefox browser does
not generate RSA keys in normal operation and is not affected, but products
built on top of it might. This vulnerability affects Firefox < 78.
Assigned-to
mdeslaur
Notes
Package
Source: nss (LP Ubuntu Debian)
Upstream:released (3.53.1)
Ubuntu 12.04 ESM (Precise Pangolin):released (2:3.28.4-0ubuntu0.12.04.9)
Ubuntu 14.04 ESM (Trusty Tahr):released (2:3.28.4-0ubuntu0.14.04.5+esm6)
Ubuntu 16.04 LTS (Xenial Xerus):released (2:3.28.4-0ubuntu0.16.04.12)
Ubuntu 18.04 LTS (Bionic Beaver):released (2:3.35-2ubuntu2.9)
Ubuntu 20.04 LTS (Focal Fossa):released (2:3.49.1-1ubuntu1.2)
Ubuntu 20.10 (Groovy Gorilla):released (2:3.49.1-1ubuntu3)
Patches:
Upstream:https://hg.mozilla.org/projects/nss/rev/699541a7793bbe9b20f1d73dc49e25c6054aa4c1
More Information

Updated: 2020-07-28 20:08:12 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)