There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
https://www.mozilla.org/security/advisories/mfsa2024-20/
https://www.mozilla.org/security/advisories/mfsa2024-19/
https://www.mozilla.org/security/advisories/mfsa2024-18/
https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html
https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html