In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://security.netapp.com/advisory/ntap-20210129-0001/
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf