--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-6ed9c65eaf
2026-03-21 01:09:55.393257+00:00
--------------------------------------------------------------------------------

Name        : cpp-httplib
Product     : Fedora 42
Version     : 0.37.1
Release     : 2.fc42
URL         : https://github.com/yhirose/cpp-httplib
Summary     : A C++11 single-file header-only cross platform HTTP/HTTPS library
Description :
A C++11 single-file header-only cross platform HTTP/HTTPS library.

It's extremely easy to setup. Just include the httplib.h file in your code!

--------------------------------------------------------------------------------
Update Information:

Update to 0.37.1 (rbhz#2445943)
Fixes Denial of Service via malformed Content-Length header
  (CVE-2026-31870
Reenables 32-bit build
Update to 0.37.0 (rhbz#2441656)
Fixes Denial of Service via crafted HTTP POST request (CVE-2026-29076,
rhbz#2445663)
Update to 0.35.0
Payload size limit bypass via gzip decompression in ContentReader (streaming)
allows oversized request bodies (CVE-2026-28435, rhbz#2444638)
Default exception handler leaks e.what() to clients via EXCEPTION_WHAT response
header (CVE-2026-28434, rhbz#2444636)
https://github.com/yhirose/cpp-httplib/compare/v0.32.0...v0.37.0
--------------------------------------------------------------------------------
ChangeLog:

* Thu Mar 12 2026 Petr Menšík <[email protected]> - 0.37.1-2
- Build for 32 bits again
* Thu Mar 12 2026 Petr Menšík <[email protected]> - 0.37.1-1
- Update to 0.37.1 (rhbz#2445943)
- Fixes Denial of Service via malformed Content-Length header
  (CVE-2026-31870)
- https://github.com/yhirose/cpp-
  httplib/security/advisories/GHSA-39q5-hh6x-jpxx
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.37.1
* Mon Mar  9 2026 Petr Menšík <[email protected]> - 0.37.0-1
- Update to 0.37.0 (rhbz#2441656)
- Fixes Denial of Service via crafted HTTP POST request (CVE-2026-29076)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2441656 - cpp-httplib-0.37.0 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=2441656
  [ 2 ] Bug #2444636 - CVE-2026-28434 cpp-httplib: default exception handler 
leaks e.what() to clients via EXCEPTION_WHAT response header [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2444636
  [ 3 ] Bug #2444638 - CVE-2026-28435 cpp-httplib: payload size limit bypass 
via gzip decompression in ContentReader (streaming) allows oversized request 
bodies [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2444638
  [ 4 ] Bug #2445663 - CVE-2026-29076 cpp-httplib: cpp-httplib: Denial of 
Service via crafted HTTP POST request [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2445663
  [ 5 ] Bug #2445943 - cpp-httplib-0.37.1 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=2445943
  [ 6 ] Bug #2446926 - CVE-2026-31870 cpp-httplib: cpp-httplib: Denial of 
Service via malformed Content-Length header [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2446926
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-6ed9c65eaf' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://forge.fedoraproject.org/infra/tickets/issues/new

Reply via email to