Description: "NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys."
@maintainer(s), let us know when ready for stabilisation.
s390 stable
arm64 stable
sparc stable
amd64 stable
arm stable
ppc stable
x86 stable
hppa stable
ppc64, ping
nss-3.52.1 needs an upstream patch to make it build on ppc64 (bug #722110). The patch won't be in upstream nss before 3.55.
ppc64 stable. Maintainer(s), please cleanup. Security, please vote.
GLSA vote: yes
This issue was resolved and addressed in GLSA 202007-49 at https://security.gentoo.org/glsa/202007-49 by GLSA coordinator Sam James (sam_c).
(In reply to GLSAMaker/CVETool Bot from comment #14) > This issue was resolved and addressed in > GLSA 202007-49 at https://security.gentoo.org/glsa/202007-49 > by GLSA coordinator Sam James (sam_c). Reopening for cleanup.
(In reply to Sam James from comment #15) > (In reply to GLSAMaker/CVETool Bot from comment #14) > > This issue was resolved and addressed in > > GLSA 202007-49 at https://security.gentoo.org/glsa/202007-49 > > by GLSA coordinator Sam James (sam_c). > > Reopening for cleanup. ping.