In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
{
"binaries": [
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4",
"binary_name": "libnss3"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4",
"binary_name": "libnss3-1d"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4",
"binary_name": "libnss3-dev"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4",
"binary_name": "libnss3-nssdb"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm4",
"binary_name": "libnss3-tools"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.10",
"binary_name": "libnss3"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.10",
"binary_name": "libnss3-1d"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.10",
"binary_name": "libnss3-dev"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.10",
"binary_name": "libnss3-nssdb"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.10",
"binary_name": "libnss3-tools"
}
],
"availability": "No subscription required"
}