CVE-2024-7531

Name
CVE-2024-7531
Description
Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
https://bugzilla.mozilla.org/show_bug.cgi?id=1905691
https://www.mozilla.org/security/advisories/mfsa2024-33/
https://www.mozilla.org/security/advisories/mfsa2024-34/
https://www.mozilla.org/security/advisories/mfsa2024-35/

Match rules

CPE URI Source package Min version Max version
firefox >= unspecified < 129
firefox-esr >= unspecified < 115.14
firefox-esr >= unspecified < 128.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
firefox 3.20-community 128.0.3-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable
firefox-esr 3.20-community 115.13.0-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable
firefox-esr edge-community 115.15.0-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable