CVE-2020-12402
Published: 19 June 2020
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
Priority
CVSS 3 base score: 4.4
Status
Package | Release | Status |
---|---|---|
nss Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.53.1)
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(2:3.49.1-1ubuntu3)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(2:3.49.1-1ubuntu1.2)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(2:3.35-2ubuntu2.9)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(2:3.28.4-0ubuntu0.16.04.12)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(2:3.28.4-0ubuntu0.14.04.5+esm6)
|
|
Patches: Upstream: https://hg.mozilla.org/projects/nss/rev/699541a7793bbe9b20f1d73dc49e25c6054aa4c1 |