An issue has been found in package nss, which consists of a couple of Network Security Service libraries. Certain cryptographic primitives in nss did not check the length of the input text. This could result in a potential heap-based buffer overflow.
For Debian 7 Wheezy, these problems have been fixed in version 2:3.26-1+debu7u11.
We recommend that you upgrade your nss packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/