Source: cpp-httplib
Version: 0.18.7-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for cpp-httplib.

CVE-2026-31870[0]:
| cpp-httplib is a C++11 single-file header-only cross platform
| HTTP/HTTPS library. Prior to 0.37.1, when a cpp-httplib client uses
| the streaming API (httplib::stream::Get, httplib::stream::Post,
| etc.), the library calls std::stoull() directly on the Content-
| Length header value received from the server with no input
| validation and no exception handling. std::stoull throws
| std::invalid_argument for non-numeric strings and std::out_of_range
| for values exceeding ULLONG_MAX. Since nothing catches these
| exceptions, the C++ runtime calls std::terminate(), which kills the
| process with SIGABRT. Any server the client connects to — including
| servers reached via HTTP redirects, third-party APIs, or man-in-the-
| middle positions can crash the client application with a single HTTP
| response. No authentication is required. No interaction from the end
| user is required. The crash is deterministic and immediate. This
| vulnerability is fixed in 0.37.1.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-31870
    https://www.cve.org/CVERecord?id=CVE-2026-31870
[1] 
https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-39q5-hh6x-jpxx
[2] 
https://github.com/yhirose/cpp-httplib/commit/e41ec36274a235d8b0bbf21d57e32068a30f6519

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to