[Quantal] xmlrpc-c is vulnerable to CVE-2012-0876 and CVE-2012-1148

Bug #1048835 reported by Tyler Hicks
This bug affects 1 person
Affects Status Importance Assigned to Milestone
xmlrpc-c (Ubuntu)
Fix Released
Micah Gersten
Fix Released
Micah Gersten

Bug Description

XML-RPC for C and C++ could be made to cause a denial of service by consuming excessive CPU and memory resources.

Here is the USN for the stable releases:


and the security team CVE tracker links:


Related branches

CVE References

Revision history for this message
Tyler Hicks (tyhicks) wrote :
Changed in xmlrpc-c (Ubuntu):
assignee: Tyler Hicks (tyhicks) → nobody
status: Triaged → Confirmed
Revision history for this message
Micah Gersten (micahg) wrote :

Taking a look

Changed in xmlrpc-c (Ubuntu Quantal):
assignee: nobody → Micah Gersten (micahg)
status: Confirmed → In Progress
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package xmlrpc-c - 1.16.33-3.1ubuntu6

xmlrpc-c (1.16.33-3.1ubuntu6) quantal; urgency=low

  * Run the tests as part of the build process
    - debian/patches/FTBFS-tests.patch: Fix issues when running make check.
      Based on upstream patches.
    - debian/rules: Run make check after building
  * Fix dependencies of xmlrpc-api-utils
    - debian/control: xml-rcp-api2cpp needs libxmlrpc_cpp.so.4, so depend on
  * SECURITY UPDATE: Denial of service via hash collisions (LP: #1048835)
    - debian/patches/CVE-2012-0876.patch: Add random salt value to
      hash inputs. Based on upstream patch.
    - CVE-2012-0876
  * SECURITY UPDATE: Denial of service via memory leak (LP: #1048835)
    - debian/patches/CVE-2012-1148.patch: Properly reallocate memory.
      Based on upstream patch.
    - CVE-2012-1148
 -- Tyler Hicks <email address hidden> Mon, 10 Sep 2012 14:57:29 -0700

Changed in xmlrpc-c (Ubuntu Quantal):
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers