In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
{
    "binaries": [
        {
            "binary_name": "libnss3",
            "binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4"
        },
        {
            "binary_name": "libnss3-1d",
            "binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4"
        },
        {
            "binary_name": "libnss3-dev",
            "binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4"
        },
        {
            "binary_name": "libnss3-nssdb",
            "binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4"
        },
        {
            "binary_name": "libnss3-tools",
            "binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
          {
    "binaries": [
        {
            "binary_name": "libnss3",
            "binary_version": "2:3.28.4-0ubuntu0.16.04.10"
        },
        {
            "binary_name": "libnss3-1d",
            "binary_version": "2:3.28.4-0ubuntu0.16.04.10"
        },
        {
            "binary_name": "libnss3-dev",
            "binary_version": "2:3.28.4-0ubuntu0.16.04.10"
        },
        {
            "binary_name": "libnss3-nssdb",
            "binary_version": "2:3.28.4-0ubuntu0.16.04.10"
        },
        {
            "binary_name": "libnss3-tools",
            "binary_version": "2:3.28.4-0ubuntu0.16.04.10"
        }
    ],
    "availability": "No subscription required"
}