In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "libnss3-nssdb": "2:3.28.4-0ubuntu0.14.04.5+esm4", "libnss3-1d": "2:3.28.4-0ubuntu0.14.04.5+esm4", "libnss3-dbgsym": "2:3.28.4-0ubuntu0.14.04.5+esm4", "libnss3": "2:3.28.4-0ubuntu0.14.04.5+esm4", "libnss3-dev": "2:3.28.4-0ubuntu0.14.04.5+esm4", "libnss3-dbg": "2:3.28.4-0ubuntu0.14.04.5+esm4", "libnss3-tools": "2:3.28.4-0ubuntu0.14.04.5+esm4", "libnss3-tools-dbgsym": "2:3.28.4-0ubuntu0.14.04.5+esm4" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libnss3-nssdb": "2:3.28.4-0ubuntu0.16.04.10", "libnss3-1d": "2:3.28.4-0ubuntu0.16.04.10", "libnss3-dbgsym": "2:3.28.4-0ubuntu0.16.04.10", "libnss3": "2:3.28.4-0ubuntu0.16.04.10", "libnss3-dev": "2:3.28.4-0ubuntu0.16.04.10", "libnss3-dbg": "2:3.28.4-0ubuntu0.16.04.10", "libnss3-tools": "2:3.28.4-0ubuntu0.16.04.10", "libnss3-tools-dbgsym": "2:3.28.4-0ubuntu0.16.04.10" } ] }