In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "libnss3",
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4"
},
{
"binary_name": "libnss3-1d",
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4"
},
{
"binary_name": "libnss3-dev",
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4"
},
{
"binary_name": "libnss3-nssdb",
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4"
},
{
"binary_name": "libnss3-tools",
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libnss3",
"binary_version": "2:3.28.4-0ubuntu0.16.04.10"
},
{
"binary_name": "libnss3-1d",
"binary_version": "2:3.28.4-0ubuntu0.16.04.10"
},
{
"binary_name": "libnss3-dev",
"binary_version": "2:3.28.4-0ubuntu0.16.04.10"
},
{
"binary_name": "libnss3-nssdb",
"binary_version": "2:3.28.4-0ubuntu0.16.04.10"
},
{
"binary_name": "libnss3-tools",
"binary_version": "2:3.28.4-0ubuntu0.16.04.10"
}
]
}