CVE-2020-6829
Published: 05 August 2020
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Priority
CVSS 3 base score: 5.3
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
Upstream |
Released
(80)
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(80.0.1+build1-0ubuntu1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(80.0+build2-0ubuntu0.20.04.1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(80.0+build2-0ubuntu0.18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(80.0+build2-0ubuntu0.16.04.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
nss Launchpad, Ubuntu, Debian |
Upstream |
Released
(2:3.55-1)
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(2:3.55-1ubuntu1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(2:3.49.1-1ubuntu1.4)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(2:3.35-2ubuntu2.11)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(2:3.28.4-0ubuntu0.16.04.13)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(2:3.28.4-0ubuntu0.14.04.5+esm7)
|
|
Patches: Upstream: https://hg.mozilla.org/projects/nss/rev/e55ab3145546ae3cf1333b43956a974675d2d25c Upstream: https://hg.mozilla.org/projects/nss/rev/3f022d5eca5d3cd0e366a825a5681953d76299d0 |
Notes
Author | Note |
---|---|
leosilva | same fix/patches of CVE-2020-12400 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
- https://usn.ubuntu.com/usn/usn-4455-1
- https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
- https://usn.ubuntu.com/usn/usn-4474-1
- NVD
- Launchpad
- Debian