[ASA-202107-38] firefox-ublock-origin: denial of service
Jonas Witschel
diabonas at archlinux.org
Tue Jul 20 19:30:23 UTC 2021
Arch Linux Security Advisory ASA-202107-38
==========================================
Severity: Medium
Date : 2021-07-20
CVE-ID : CVE-2021-36773
Package : firefox-ublock-origin
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-2172
Summary
=======
The package firefox-ublock-origin before version 1.36.2-1 is vulnerable
to denial of service.
Resolution
==========
Upgrade to 1.36.2-1.
# pacman -Syu "firefox-ublock-origin>=1.36.2-1"
The problem has been fixed upstream in version 1.36.2.
Workaround
==========
None.
Description
===========
uBlock Origin before 1.36.2 supports an arbitrary depth of parameter
nesting for strict blocking, which allows crafted web sites to cause a
denial of service (unbounded recursion that can trigger memory
consumption and a loss of all blocking functionality).
Impact
======
A crafted web site could consume a lot of memory, disabling all
blocking functionality.
References
==========
https://github.com/vtriolet/writings/blob/main/posts/2021/ublock_origin_and_umatrix_denial_of_service.adoc
https://github.com/uBlockOrigin/uBlock-issues/issues/1649
https://github.com/gorhill/uBlock/commit/365b20e8cc27cd776ef3868b02ea739ba387356d
https://security.archlinux.org/CVE-2021-36773
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210720/4e4f0632/attachment-0001.sig>
More information about the arch-security
mailing list