[ASA-202107-38] firefox-ublock-origin: denial of service

Jonas Witschel diabonas at archlinux.org
Tue Jul 20 19:30:23 UTC 2021


Arch Linux Security Advisory ASA-202107-38
==========================================

Severity: Medium
Date    : 2021-07-20
CVE-ID  : CVE-2021-36773
Package : firefox-ublock-origin
Type    : denial of service
Remote  : Yes
Link    : https://security.archlinux.org/AVG-2172

Summary
=======

The package firefox-ublock-origin before version 1.36.2-1 is vulnerable
to denial of service.

Resolution
==========

Upgrade to 1.36.2-1.

# pacman -Syu "firefox-ublock-origin>=1.36.2-1"

The problem has been fixed upstream in version 1.36.2.

Workaround
==========

None.

Description
===========

uBlock Origin before 1.36.2 supports an arbitrary depth of parameter
nesting for strict blocking, which allows crafted web sites to cause a
denial of service (unbounded recursion that can trigger memory
consumption and a loss of all blocking functionality).

Impact
======

A crafted web site could consume a lot of memory, disabling all
blocking functionality.

References
==========

https://github.com/vtriolet/writings/blob/main/posts/2021/ublock_origin_and_umatrix_denial_of_service.adoc
https://github.com/uBlockOrigin/uBlock-issues/issues/1649
https://github.com/gorhill/uBlock/commit/365b20e8cc27cd776ef3868b02ea739ba387356d
https://security.archlinux.org/CVE-2021-36773
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210720/4e4f0632/attachment-0001.sig>


More information about the arch-security mailing list