Bug 1174763 (CVE-2020-6829)

Summary: VUL-0: CVE-2020-6829,CVE-2020-12400,CVE-2020-12401,CVE-2020-12403: mozilla-nss: Update to 3.55
Product: [openSUSE] openSUSE Tumbleweed Reporter: Alexandros Toptsoglou <atoptsoglou>
Component: SecurityAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P3 - Medium CC: gabriele.sonnu, martin.sirringhaus, meissner
Version: Current   
Target Milestone: Current   
Hardware: Other   
OS: Other   
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Alexandros Toptsoglou 2020-07-31 11:08:22 UTC
Includes the following CVEs: 


CVE-2020-6829: Side channel attack on ECDSA signature generation
CVE-2020-12400: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function
CVE-2020-12401: ECDSA timing attack mitigation bypass
CVE-2020-12403: Explicitly disable multi-part ChaCha20 (which was not functioning correctly) and more strictly enforce tag length.

It requires NSPR 4.27

Reference

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
Comment 1 Martin Sirringhaus 2020-07-31 11:20:52 UTC
SLE (and Leap) will stay on the 3.53.* branch, which is the "ESR" branch of NSS (the one Firefox ESR is using). All relevant security-fixes are going to be downported to it. Seems like these CVEs only affect 3.55.
Comment 2 Alexandros Toptsoglou 2020-07-31 11:55:54 UTC
(In reply to Martin Sirringhaus from comment #1)
> SLE (and Leap) will stay on the 3.53.* branch, which is the "ESR" branch of
> NSS (the one Firefox ESR is using). All relevant security-fixes are going to
> be downported to it. Seems like these CVEs only affect 3.55.

right Turning this bug as a TW bug
Comment 3 Gabriele Sonnu 2022-04-06 13:19:07 UTC
All done.
Comment 4 Gabriele Sonnu 2022-04-06 13:19:28 UTC
Closing.