Operating System:

[Debian]

Published:

21 February 2023

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.1076
                            nss security update
                             21 February 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           nss
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-0767 CVE-2020-12403 CVE-2020-12401
                   CVE-2020-12400 CVE-2020-6829 

Original Bulletin: 
   https://www.debian.org/lts/security/2023/dla-3327

Comment: CVSS (Max):  9.1 CVE-2020-12403 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H)
         CVSS Source: [NVD], Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3327-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Markus Koschany
February 20, 2023                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : nss
Version        : 2:3.42.1-1+deb10u6
CVE ID         : CVE-2020-6829 CVE-2020-12400 CVE-2020-12401 CVE-2020-12403
                 CVE-2023-0767

Multiple security vulnerabilities have been discovered in nss, the Network
Security Service libraries.

CVE-2020-6829

    When performing EC scalar point multiplication, the wNAF point
    multiplication algorithm was used; which leaked partial information about
    the nonce used during signature generation. Given an electro-magnetic trace
    of a few signature generations, the private key could have been computed.

CVE-2020-12400

    When converting coordinates from projective to affine, the modular
    inversion was not performed in constant time, resulting in a possible
    timing-based side channel attack.

CVE-2020-12401

    During ECDSA signature generation, padding applied in the nonce designed to
    ensure constant-time scalar multiplication was removed, resulting in
    variable-time execution dependent on secret data.

CVE-2020-12403

    A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS.
    When using multi-part Chacha20, it could cause out-of-bounds reads.
    This issue was fixed by explicitly disabling multi-part ChaCha20
    (which was not functioning correctly) and strictly enforcing tag length.

CVE-2023-0767

    Christian Holler discovered that incorrect handling of PKCS 12 Safe Bag
    attributes may result in execution of arbitrary code if a specially crafted
    PKCS 12 certificate bundle is processed.

For Debian 10 buster, these problems have been fixed in version
2:3.42.1-1+deb10u6.

We recommend that you upgrade your nss packages.

For the detailed security status of nss please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nss

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=RBW9
-----END PGP SIGNATURE-----