Описание
There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
firefox | fixed | 125.0.1-1 | package | |
firefox-esr | fixed | 115.10.0esr-1 | package | |
thunderbird | fixed | 1:115.10.1-1 | package |
Примечания
https://www.mozilla.org/en-US/security/advisories/mfsa2024-18/#CVE-2024-3302
https://www.mozilla.org/en-US/security/advisories/mfsa2024-19/#CVE-2024-3302
https://www.mozilla.org/en-US/security/advisories/mfsa2024-20/#CVE-2024-3302
EPSS
Связанные уязвимости
There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
EPSS