It was discovered that NSS incorrectly handled certain memory operations. A remote attacker could use this issue to cause NSS to crash, resulting in a denial of service, or possibly execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libnss3", "binary_version": "2:3.28.4-0ubuntu0.16.04.8" }, { "binary_name": "libnss3-1d", "binary_version": "2:3.28.4-0ubuntu0.16.04.8" }, { "binary_name": "libnss3-dbg", "binary_version": "2:3.28.4-0ubuntu0.16.04.8" }, { "binary_name": "libnss3-dbgsym", "binary_version": "2:3.28.4-0ubuntu0.16.04.8" }, { "binary_name": "libnss3-dev", "binary_version": "2:3.28.4-0ubuntu0.16.04.8" }, { "binary_name": "libnss3-nssdb", "binary_version": "2:3.28.4-0ubuntu0.16.04.8" }, { "binary_name": "libnss3-tools", "binary_version": "2:3.28.4-0ubuntu0.16.04.8" }, { "binary_name": "libnss3-tools-dbgsym", "binary_version": "2:3.28.4-0ubuntu0.16.04.8" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libnss3", "binary_version": "2:3.35-2ubuntu2.5" }, { "binary_name": "libnss3-dbg", "binary_version": "2:3.35-2ubuntu2.5" }, { "binary_name": "libnss3-dev", "binary_version": "2:3.35-2ubuntu2.5" }, { "binary_name": "libnss3-tools", "binary_version": "2:3.35-2ubuntu2.5" } ] }