OESA-2026-1639

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1639
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1639.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-1639
Upstream
Published
2026-03-20T14:23:10Z
Modified
2026-03-20T14:30:35.668760Z
Summary
cpp-httplib security update
Details

A C++11 single-file header-only cross platform HTTP/HTTPS library. It's extremely easy to setup. Just include httplib.h file in your code!

Security Fix(es):

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.37.1, when a cpp-httplib client uses the streaming API (such as httplib::stream::Get, httplib::stream::Post, etc.), the library calls std::stoull() directly on the Content-Length header value received from the server with no input validation and no exception handling. std::stoull throws std::invalidargument for non-numeric strings and std::outofrange for values exceeding ULLONGMAX. Since nothing catches these exceptions, the C++ runtime calls std::terminate(), which kills the process with SIGABRT. Any server the client connects to — including servers reached via HTTP redirects, third-party APIs, or man-in-the-middle positions — can crash the client application with a single HTTP response. No authentication is required. No interaction from the end user is required. The crash is deterministic and immediate. This vulnerability is fixed in version 0.37.1.(CVE-2026-31870)

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.2, when a cpp-httplib client is configured with a proxy and setfollowlocation(true), any HTTPS redirect it follows will have TLS certificate and hostname verification silently disabled on the new connection. The client will accept any certificate presented by the redirect target — expired, self-signed, or forged — without raising an error or notifying the application. A network attacker in a position to return a redirect response can fully intercept the follow-up HTTPS connection, including any credentials or session tokens in flight. This vulnerability is fixed in 0.37.2.(CVE-2026-32627)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS-SP2 / cpp-httplib

Package

Name
cpp-httplib
Purl
pkg:rpm/openEuler/cpp-httplib&distro=openEuler-24.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.38.0-1.oe2403sp2

Ecosystem specific

{
    "x86_64": [
        "cpp-httplib-0.38.0-1.oe2403sp2.x86_64.rpm",
        "cpp-httplib-debuginfo-0.38.0-1.oe2403sp2.x86_64.rpm",
        "cpp-httplib-debugsource-0.38.0-1.oe2403sp2.x86_64.rpm",
        "cpp-httplib-devel-0.38.0-1.oe2403sp2.x86_64.rpm"
    ],
    "aarch64": [
        "cpp-httplib-0.38.0-1.oe2403sp2.aarch64.rpm",
        "cpp-httplib-debuginfo-0.38.0-1.oe2403sp2.aarch64.rpm",
        "cpp-httplib-debugsource-0.38.0-1.oe2403sp2.aarch64.rpm",
        "cpp-httplib-devel-0.38.0-1.oe2403sp2.aarch64.rpm"
    ],
    "src": [
        "cpp-httplib-0.38.0-1.oe2403sp2.src.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-1639.json"