Debian 9815 Published by

A nss security update has been released for Debian GNU/Linux 10 LTS.

DLA 3327-1: nss security update

Debian LTS Advisory DLA-3327-1 Markus Koschany
February 20, 2023

Package : nss
Version : 2:3.42.1-1+deb10u6
CVE ID : CVE-2020-6829 CVE-2020-12400 CVE-2020-12401 CVE-2020-12403

Multiple security vulnerabilities have been discovered in nss, the Network
Security Service libraries.


When performing EC scalar point multiplication, the wNAF point
multiplication algorithm was used; which leaked partial information about
the nonce used during signature generation. Given an electro-magnetic trace
of a few signature generations, the private key could have been computed.


When converting coordinates from projective to affine, the modular
inversion was not performed in constant time, resulting in a possible
timing-based side channel attack.


During ECDSA signature generation, padding applied in the nonce designed to
ensure constant-time scalar multiplication was removed, resulting in
variable-time execution dependent on secret data.


A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS.
When using multi-part Chacha20, it could cause out-of-bounds reads.
This issue was fixed by explicitly disabling multi-part ChaCha20 
(which was not functioning correctly) and strictly enforcing tag length.


Christian Holler discovered that incorrect handling of PKCS 12 Safe Bag
attributes may result in execution of arbitrary code if a specially crafted
PKCS 12 certificate bundle is processed.

For Debian 10 buster, these problems have been fixed in version

We recommend that you upgrade your nss packages.

For the detailed security status of nss please refer to
its security tracker page at:

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: