CVE-2020-12402

Published: 19 June 2020

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

Priority

Medium

CVSS 3 base score: 4.4

Status

Package Release Status
nss
Launchpad, Ubuntu, Debian
Upstream
Released (3.53.1)
Ubuntu 20.10 (Groovy Gorilla)
Released (2:3.49.1-1ubuntu3)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2:3.49.1-1ubuntu1.2)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2:3.35-2ubuntu2.9)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (2:3.28.4-0ubuntu0.16.04.12)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2:3.28.4-0ubuntu0.14.04.5+esm6)
Patches:
Upstream: https://hg.mozilla.org/projects/nss/rev/699541a7793bbe9b20f1d73dc49e25c6054aa4c1