发布时间: 2024年7月5日
修改时间: 2025年3月14日
There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
NVD | openEuler | |
---|---|---|
Confidentiality | None | |
Attack Vector | Network | |
CVSS评分 | N/A | 3.7 |
Attack Complexity | High | |
Privileges Required | None | |
Scope | Unchanged | |
Integrity | None | |
User Interaction | None | |
Availability | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-4795 | firefox security update | 2025年2月17日 |
产品 | 包 | 状态 |
---|---|---|
KY3.5.3 | firefox | Fixed |
V6 | firefox | Fixed |