OPENSUSE-SU-2026:10435-1
Vulnerability from csaf_opensuse - Published: 2026-03-26 00:00 - Updated: 2026-03-26 00:00Summary
cpp-httplib-devel-0.38.0-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: cpp-httplib-devel-0.38.0-1.1 on GA media
Description of the patch: These are all security issues fixed in the cpp-httplib-devel-0.38.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2026-10435
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
8.7 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.7 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cpp-httplib-devel-0.38.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the cpp-httplib-devel-0.38.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10435",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10435-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-21428 page",
"url": "https://www.suse.com/security/cve/CVE-2026-21428/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22776 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-28434 page",
"url": "https://www.suse.com/security/cve/CVE-2026-28434/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-28435 page",
"url": "https://www.suse.com/security/cve/CVE-2026-28435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-29076 page",
"url": "https://www.suse.com/security/cve/CVE-2026-29076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32627 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32627/"
}
],
"title": "cpp-httplib-devel-0.38.0-1.1 on GA media",
"tracking": {
"current_release_date": "2026-03-26T00:00:00Z",
"generator": {
"date": "2026-03-26T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10435-1",
"initial_release_date": "2026-03-26T00:00:00Z",
"revision_history": [
{
"date": "2026-03-26T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cpp-httplib-devel-0.38.0-1.1.aarch64",
"product": {
"name": "cpp-httplib-devel-0.38.0-1.1.aarch64",
"product_id": "cpp-httplib-devel-0.38.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcpp-httplib0_38-0.38.0-1.1.aarch64",
"product": {
"name": "libcpp-httplib0_38-0.38.0-1.1.aarch64",
"product_id": "libcpp-httplib0_38-0.38.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cpp-httplib-devel-0.38.0-1.1.ppc64le",
"product": {
"name": "cpp-httplib-devel-0.38.0-1.1.ppc64le",
"product_id": "cpp-httplib-devel-0.38.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"product": {
"name": "libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"product_id": "libcpp-httplib0_38-0.38.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cpp-httplib-devel-0.38.0-1.1.s390x",
"product": {
"name": "cpp-httplib-devel-0.38.0-1.1.s390x",
"product_id": "cpp-httplib-devel-0.38.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcpp-httplib0_38-0.38.0-1.1.s390x",
"product": {
"name": "libcpp-httplib0_38-0.38.0-1.1.s390x",
"product_id": "libcpp-httplib0_38-0.38.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cpp-httplib-devel-0.38.0-1.1.x86_64",
"product": {
"name": "cpp-httplib-devel-0.38.0-1.1.x86_64",
"product_id": "cpp-httplib-devel-0.38.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcpp-httplib0_38-0.38.0-1.1.x86_64",
"product": {
"name": "libcpp-httplib0_38-0.38.0-1.1.x86_64",
"product_id": "libcpp-httplib0_38-0.38.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp-httplib-devel-0.38.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64"
},
"product_reference": "cpp-httplib-devel-0.38.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp-httplib-devel-0.38.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le"
},
"product_reference": "cpp-httplib-devel-0.38.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp-httplib-devel-0.38.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x"
},
"product_reference": "cpp-httplib-devel-0.38.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp-httplib-devel-0.38.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64"
},
"product_reference": "cpp-httplib-devel-0.38.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcpp-httplib0_38-0.38.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64"
},
"product_reference": "libcpp-httplib0_38-0.38.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcpp-httplib0_38-0.38.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le"
},
"product_reference": "libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcpp-httplib0_38-0.38.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x"
},
"product_reference": "libcpp-httplib0_38-0.38.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcpp-httplib0_38-0.38.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
},
"product_reference": "libcpp-httplib0_38-0.38.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-21428",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-21428"
}
],
"notes": [
{
"category": "general",
"text": "cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.30.0, the ``write_headers`` function does not check for CR \u0026 LF characters in user supplied headers, allowing untrusted header value to escape header lines.\nThis vulnerability allows attackers to add extra headers, modify request body unexpectedly \u0026 trigger an SSRF attack. When combined with a server that supports http1.1 pipelining (springboot, python twisted etc), this can be used for server side request forgery (SSRF). Version 0.30.0 fixes this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-21428",
"url": "https://www.suse.com/security/cve/CVE-2026-21428"
},
{
"category": "external",
"summary": "SUSE Bug 1255835 for CVE-2026-21428",
"url": "https://bugzilla.suse.com/1255835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-21428"
},
{
"cve": "CVE-2026-22776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22776"
}
],
"notes": [
{
"category": "general",
"text": "cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.30.1, a Denial of Service (DoS) vulnerability exists in cpp-httplib due to the unsafe handling of compressed HTTP request bodies (Content-Encoding: gzip, br, etc.). The library validates the payload_max_length against the compressed data size received from the network, but does not limit the size of the decompressed data stored in memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22776",
"url": "https://www.suse.com/security/cve/CVE-2026-22776"
},
{
"category": "external",
"summary": "SUSE Bug 1256518 for CVE-2026-22776",
"url": "https://bugzilla.suse.com/1256518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-22776"
},
{
"cve": "CVE-2026-28434",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-28434"
}
],
"notes": [
{
"category": "general",
"text": "cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.35.0, when a request handler throws a C++ exception and the application has not registered a custom exception handler via set_exception_handler(), the library catches the exception and writes its message directly into the HTTP response as a header named EXCEPTION_WHAT. This header is sent to whoever made the request, with no authentication check and no special configuration required to trigger it. The behavior is on by default. A developer who does not know to opt in to set_exception_handler() will ship a server that leaks internal exception messages to any client. This vulnerability is fixed in 0.35.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-28434",
"url": "https://www.suse.com/security/cve/CVE-2026-28434"
},
{
"category": "external",
"summary": "SUSE Bug 1259221 for CVE-2026-28434",
"url": "https://bugzilla.suse.com/1259221"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-28434"
},
{
"cve": "CVE-2026-28435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-28435"
}
],
"notes": [
{
"category": "general",
"text": "cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.35.0, cpp-httplib (httplib.h) does not enforce Server::set_payload_max_length() on the decompressed request body when using HandlerWithContentReader (streaming ContentReader) with Content-Encoding: gzip (or other supported encodings). A small compressed payload can expand beyond the configured payload limit and be processed by the application, enabling a payload size limit bypass and potential denial of service (CPU/memory exhaustion). This vulnerability is fixed in 0.35.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-28435",
"url": "https://www.suse.com/security/cve/CVE-2026-28435"
},
{
"category": "external",
"summary": "SUSE Bug 1259220 for CVE-2026-28435",
"url": "https://bugzilla.suse.com/1259220"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-28435"
},
{
"cve": "CVE-2026-29076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-29076"
}
],
"notes": [
{
"category": "general",
"text": "cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.37.0, cpp-httplib uses std::regex (libstdc++) to parse RFC 5987 encoded filename* values in multipart Content-Disposition headers. The regex engine in libstdc++ implements backtracking via deep recursion, consuming one stack frame per input character. An attacker can send a single HTTP POST request with a crafted filename* parameter that causes uncontrolled stack growth, resulting in a stack overflow (SIGSEGV) that crashes the server process. This issue has been patched in version 0.37.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-29076",
"url": "https://www.suse.com/security/cve/CVE-2026-29076"
},
{
"category": "external",
"summary": "SUSE Bug 1259373 for CVE-2026-29076",
"url": "https://bugzilla.suse.com/1259373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-29076"
},
{
"cve": "CVE-2026-32627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32627"
}
],
"notes": [
{
"category": "general",
"text": "cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.2, when a cpp-httplib client is configured with a proxy and set_follow_location(true), any HTTPS redirect it follows will have TLS certificate and hostname verification silently disabled on the new connection. The client will accept any certificate presented by the redirect target - expired, self-signed, or forged - without raising an error or notifying the application. A network attacker in a position to return a redirect response can fully intercept the follow-up HTTPS connection, including any credentials or session tokens in flight. This vulnerability is fixed in 0.37.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32627",
"url": "https://www.suse.com/security/cve/CVE-2026-32627"
},
{
"category": "external",
"summary": "SUSE Bug 1259723 for CVE-2026-32627",
"url": "https://bugzilla.suse.com/1259723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:cpp-httplib-devel-0.38.0-1.1.x86_64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.aarch64",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.s390x",
"openSUSE Tumbleweed:libcpp-httplib0_38-0.38.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-32627"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…