• CVE-2024-7531

发布时间: 2024年8月16日

修改时间: 2025年3月14日

概要

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS v3 指标

NVD openEuler
Confidentiality High Low
Attack Vector Network Network
CVSS评分 6.5 4.2
Attack Complexity Low High
Privileges Required None None
Scope Unchanged Unchanged
Integrity None None
User Interaction Required Required
Availability None Low

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-4831 firefox security update 2025年2月17日

影响产品

产品 状态
KY3.5.3 firefox Fixed
V6 firefox Fixed