--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-3b0e5b457d
2026-01-22 01:14:01.609543+00:00
--------------------------------------------------------------------------------

Name        : cpp-httplib
Product     : Fedora 42
Version     : 0.30.1
Release     : 5.fc42
URL         : https://github.com/yhirose/cpp-httplib
Summary     : A C++11 single-file header-only cross platform HTTP/HTTPS library
Description :
A C++11 single-file header-only cross platform HTTP/HTTPS library.

It's extremely easy to setup. Just include the httplib.h file in your code!

--------------------------------------------------------------------------------
Update Information:

Update to 0.30.1
Denial of service (DOS) using zip bomb (CVE-2026-22776)
CRLF injection in http headers (CVE-2026-21428)
Untrusted HTTP Header Handling: X-Forwarded-For/X-Real-IP Trust (CVE-2025-66577)
https://github.com/yhirose/cpp-httplib/releases/tag/v0.30.1
--------------------------------------------------------------------------------
ChangeLog:

* Tue Jan 13 2026 Petr Menšík <[email protected]> - 0.30.1-5
- Switch to GCC 15 test fix with active PR
* Tue Jan 13 2026 Petr Menšík <[email protected]> - 0.30.1-4
- Drop 32 bit support like upstream did
* Mon Jan 12 2026 Petr Menšík <[email protected]> - 0.30.1-3
- fixup! Fix tests in last release
* Mon Jan 12 2026 Petr Menšík <[email protected]> - 0.30.1-2
- Fix tests in last release
* Mon Jan 12 2026 Petr Menšík <[email protected]> - 0.30.1-1
- Update to 0.30.1 (rhbz#2406686)
* Sat Aug 30 2025 Orion Poplawski <[email protected]> - 0.26.0-1
- Update to 0.26.0 (CVE-2025-53629)
* Wed Jul 23 2025 Fedora Release Engineering <[email protected]> - 
0.20.1-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_43_Mass_Rebuild
* Fri May  9 2025 Orion Poplawski <[email protected]> - 0.20.1-1
- Update to 0.20.1
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2364284 - CVE-2025-46728 cpp-httplib: cpp-httplib has Unbounded 
Memory Allocation in Chunked/No-Length Requests [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2364284
  [ 2 ] Bug #2379431 - CVE-2025-53629 cpp-httplib: cpp-httplib Unbounded Memory 
Allocation in Chunked/No-Length Requests Vulnerability [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2379431
  [ 3 ] Bug #2419548 - CVE-2025-66570 cpp-httplib: cpp-httplib Untrusted HTTP 
Header Handling [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2419548
  [ 4 ] Bug #2419631 - CVE-2025-66577 cpp-httplib: cpp-httplib Untrusted HTTP 
Header Handling: X-Forwarded-For/X-Real-IP Trust [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2419631
  [ 5 ] Bug #2426699 - CVE-2026-21428 cpp-httplib: cpp-httplib: Server-Side 
Request Forgery via header injection [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2426699
  [ 6 ] Bug #2428893 - CVE-2026-22776 cpp-httplib: cpp-httplib: Denial of 
Service due to excessive memory usage from compressed HTTP request bodies 
[fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2428893
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-3b0e5b457d' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to