Bug 1826231 (CVE-2020-12402) - CVE-2020-12402 nss: Side channel vulnerabilities during RSA key generation
Summary: CVE-2020-12402 nss: Side channel vulnerabilities during RSA key generation
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-12402
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1847930 1847931 1847934
Blocks: 1826178
TreeView+ depends on / blocked
 
Reported: 2020-04-21 09:30 UTC by Marian Rehak
Modified: 2021-02-26 17:19 UTC (History)
16 users (show)

Fixed In Version: nss 3.53.1
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in NSS, where it is vulnerable to RSA key generation cache timing side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. The highest threat to this flaw is to confidentiality.
Clone Of:
Environment:
Last Closed: 2020-08-03 13:27:52 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:3280 0 None None None 2020-08-03 13:01:30 UTC
Red Hat Product Errata RHSA-2020:4076 0 None None None 2020-09-29 20:58:35 UTC

Description Marian Rehak 2020-04-21 09:30:33 UTC
It was found that NSS is vulnerable to RSA key generation cache timing side channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key.

Comment 1 Mark Cooper 2020-04-22 05:57:39 UTC
OpenShift 4.x only packages nss-altfiles and has been confirmed to *not* share any of the vulnerable signature code:
    - nss-altfiles only reads information from files in the same format as /etc/passwd and /etc/group.

Comment 5 Huzaifa S. Sidhpurwala 2020-06-17 11:27:30 UTC
Upstream commit: https://hg.mozilla.org/projects/nss/rev/699541a7793bbe9b20f1d73dc49e25c6054aa4c1

Comment 6 Huzaifa S. Sidhpurwala 2020-06-17 11:27:47 UTC
External References:

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes

Comment 7 Huzaifa S. Sidhpurwala 2020-06-17 11:29:44 UTC
Created nss tracking bugs for this issue:

Affects: fedora-all [bug 1847931]

Comment 10 Huzaifa S. Sidhpurwala 2020-06-26 03:48:27 UTC
Statement:

A timing attack was found in the way NSS generated RSA keys. A man-in-the-middle attacker could use this attack during RSA key generation to recover the private key. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.

Comment 11 Huzaifa S. Sidhpurwala 2020-06-26 03:48:31 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 12 Huzaifa S. Sidhpurwala 2020-07-31 10:04:45 UTC
Upstream bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1631597

Comment 13 errata-xmlrpc 2020-08-03 13:01:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:3280 https://access.redhat.com/errata/RHSA-2020:3280

Comment 14 Product Security DevOps Team 2020-08-03 13:27:52 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-12402

Comment 16 errata-xmlrpc 2020-09-29 20:58:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:4076 https://access.redhat.com/errata/RHSA-2020:4076

Comment 17 Pedro Sampaio 2021-02-26 17:19:23 UTC
Acknowledgments:

Name: the Mozilla Project
Upstream: Sohaib ul Hassan (NISEC, Tampere University), Iaroslav Gridin (NISEC, Tampere University), Ignacio M. Delgado-Lozano (NISEC, Tampere University), Cesar Pereida (NISEC, Tampere University), Jesús-Javier Chi-Domínguez (NISEC, Tampere University), Alejandro Cabrera Aldaya (NISEC, Tampere University), Billy Bob Brumley (NISEC, Tampere University)


Note You need to log in before you can comment on or make changes to this bug.