The vulnerability is a side-channel attack (Minerva) affecting ECDSA implementations for NIST P-256, P-384, and P-521 curves in NSS. The attack allows potential recovery of the private key by observing timing variations during the signing process, specifically related to the handling of the nonce 'k'.
The Bugzilla report (1853908) is the primary source of information. It details that the SEC_SignData API was used for testing and that the leak was identified in the k-generation phase of ECDSA. Specific lines in lib/freebl/ec.c (related to MPI object normalization for 'k') were initially suspected.
The patches mentioned in the Bugzilla report (though not directly accessible as commit diffs via the tool) targeted these NIST curves. The functions ec_secp256r1_sign_digest, ec_secp384r1_sign_digest, and ec_secp521r1_sign_digest are the specific implementations for ECDSA signing for these curves within lib/freebl/ec.c. These are the functions where the vulnerable cryptographic operations involving the nonce 'k' occur.
The ECDSA_SignDigest function is responsible for generating the nonce 'k' and calling the lower-level curve-specific signing functions. Therefore, it is also a key part of the vulnerable pathway.
While SEC_SignData is the high-level API entry point, the actual vulnerability lies deeper in the cryptographic implementation specific to each curve. The identified functions are those that would be active during the signing operation and where the timing leak would manifest, making them appear in a runtime profile during exploitation.