public inbox for buildroot@busybox.net
 help / color / mirror / Atom feed
* [Buildroot] [PATCH 1/2] package/cpp-httplib: security bump to v0.37.2
@ 2026-03-30 15:06 Titouan Christophe via buildroot
  2026-03-30 15:06 ` [Buildroot] [PATCH 2/2] package/cpp-httplib: bump to v0.40.0 Titouan Christophe via buildroot
                   ` (2 more replies)
  0 siblings, 3 replies; 5+ messages in thread
From: Titouan Christophe via buildroot @ 2026-03-30 15:06 UTC (permalink / raw)
  To: buildroot; +Cc: Aleksandr Makarov

See the release notes of intermediate versions:
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.28.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.29.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.30.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.30.1
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.30.2
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.31.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.32.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.33.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.33.1
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.34.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.35.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.36.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.37.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.37.1
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.37.2

This fixes numerous vulnerabilities:

- CVE-2026-21428:
    cpp-httplib is a C++11 single-file header-only cross platform
    HTTP/HTTPS library. Prior to version 0.30.0, the ``write_headers``
    function does not check for CR & LF characters in user supplied
    headers, allowing untrusted header value to escape header lines. This
    vulnerability allows attackers to add extra headers, modify request
    body unexpectedly & trigger an SSRF attack. When combined with a
    server that supports http1.1 pipelining (springboot, python twisted
    etc), this can be used for server side request forgery (SSRF). Version
    0.30.0 fixes this issue.
    https://www.cve.org/CVERecord?id=CVE-2026-21428

- CVE-2026-22776:
    cpp-httplib is a C++11 single-file header-only cross platform
    HTTP/HTTPS library. Prior to version 0.30.1, a Denial of Service (DoS)
    vulnerability exists in cpp-httplib due to the unsafe handling of
    compressed HTTP request bodies (Content-Encoding: gzip, br, etc.). The
    library validates the payload_max_length against the compressed data
    size received from the network, but does not limit the size of the
    decompressed data stored in memory.
    https://www.cve.org/CVERecord?id=CVE-2026-22776

- CVE-2026-28434:
    cpp-httplib is a C++11 single-file header-only cross platform
    HTTP/HTTPS library. Prior to 0.35.0, when a request handler throws a
    C++ exception and the application has not registered a custom
    exception handler via set_exception_handler(), the library catches the
    exception and writes its message directly into the HTTP response as a
    header named EXCEPTION_WHAT. This header is sent to whoever made the
    request, with no authentication check and no special configuration
    required to trigger it. The behavior is on by default. A developer who
    does not know to opt in to set_exception_handler() will ship a server
    that leaks internal exception messages to any client. This
    vulnerability is fixed in 0.35.0.
    https://www.cve.org/CVERecord?id=CVE-2026-28434

- CVE-2026-28435:
    cpp-httplib is a C++11 single-file header-only cross platform
    HTTP/HTTPS library. Prior to 0.35.0, cpp-httplib (httplib.h) does not
    enforce Server::set_payload_max_length() on the decompressed request
    body when using HandlerWithContentReader (streaming ContentReader)
    with Content-Encoding: gzip (or other supported encodings). A small
    compressed payload can expand beyond the configured payload limit and
    be processed by the application, enabling a payload size limit bypass
    and potential denial of service (CPU/memory exhaustion). This
    vulnerability is fixed in 0.35.0.
    https://www.cve.org/CVERecord?id=CVE-2026-28435

- CVE-2026-29076:
    cpp-httplib is a C++11 single-file header-only cross platform
    HTTP/HTTPS library. Prior to version 0.37.0, cpp-httplib uses
    std::regex (libstdc++) to parse RFC 5987 encoded filename* values in
    multipart Content-Disposition headers. The regex engine in libstdc++
    implements backtracking via deep recursion, consuming one stack frame
    per input character. An attacker can send a single HTTP POST request
    with a crafted filename* parameter that causes uncontrolled stack
    growth, resulting in a stack overflow (SIGSEGV) that crashes the
    server process. This issue has been patched in version 0.37.0.
    https://www.cve.org/CVERecord?id=CVE-2026-29076

- CVE-2026-31870:
    cpp-httplib is a C++11 single-file header-only cross platform
    HTTP/HTTPS library. Prior to 0.37.1, when a cpp-httplib client uses
    the streaming API (httplib::stream::Get, httplib::stream::Post, etc.),
    the library calls std::stoull() directly on the Content-Length header
    value received from the server with no input validation and no
    exception handling. std::stoull throws std::invalid_argument for non-
    numeric strings and std::out_of_range for values exceeding ULLONG_MAX.
    Since nothing catches these exceptions, the C++ runtime calls
    std::terminate(), which kills the process with SIGABRT. Any server the
    client connects to — including servers reached via HTTP redirects,
    third-party APIs, or man-in-the-middle positions can crash the client
    application with a single HTTP response. No authentication is
    required. No interaction from the end user is required. The crash is
    deterministic and immediate. This vulnerability is fixed in 0.37.1.
    https://www.cve.org/CVERecord?id=CVE-2026-31870

- CVE-2026-32627:
    cpp-httplib is a C++11 single-file header-only cross platform
    HTTP/HTTPS library. Prior to 0.37.2, when a cpp-httplib client is
    configured with a proxy and set_follow_location(true), any HTTPS
    redirect it follows will have TLS certificate and hostname
    verification silently disabled on the new connection. The client will
    accept any certificate presented by the redirect target — expired,
    self-signed, or forged — without raising an error or notifying the
    application. A network attacker in a position to return a redirect
    response can fully intercept the follow-up HTTPS connection, including
    any credentials or session tokens in flight. This vulnerability is
    fixed in 0.37.2.
    https://www.cve.org/CVERecord?id=CVE-2026-32627

Signed-off-by: Titouan Christophe <titouan.christophe@mind.be>
---
 package/cpp-httplib/cpp-httplib.hash | 2 +-
 package/cpp-httplib/cpp-httplib.mk   | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/package/cpp-httplib/cpp-httplib.hash b/package/cpp-httplib/cpp-httplib.hash
index 904bca6d02..076b30cfa1 100644
--- a/package/cpp-httplib/cpp-httplib.hash
+++ b/package/cpp-httplib/cpp-httplib.hash
@@ -1,3 +1,3 @@
 # Locally computed:
-sha256  cc57615af359efda816122dcfca37bcbb9f1591396f50a1fd1ad70bbe6050581  cpp-httplib-0.27.0.tar.gz
+sha256  909766cd7697153c9e588b0f96defe1868b7bb11d94b8d4f0c83bb4875bc9066  cpp-httplib-0.37.2.tar.gz
 sha256  4b45cbe16d7b71b89ae6127e26e0d90a029198ca5e958ad8e3d0b8bbed364d8b  LICENSE
diff --git a/package/cpp-httplib/cpp-httplib.mk b/package/cpp-httplib/cpp-httplib.mk
index ed5c33d2a5..56e8c27fc4 100644
--- a/package/cpp-httplib/cpp-httplib.mk
+++ b/package/cpp-httplib/cpp-httplib.mk
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-CPP_HTTPLIB_VERSION = 0.27.0
+CPP_HTTPLIB_VERSION = 0.37.2
 CPP_HTTPLIB_SITE = $(call github,yhirose,cpp-httplib,v$(CPP_HTTPLIB_VERSION))
 CPP_HTTPLIB_LICENSE = MIT
 CPP_HTTPLIB_LICENSE_FILES = LICENSE
-- 
2.53.0

_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* [Buildroot] [PATCH 2/2] package/cpp-httplib: bump to v0.40.0
  2026-03-30 15:06 [Buildroot] [PATCH 1/2] package/cpp-httplib: security bump to v0.37.2 Titouan Christophe via buildroot
@ 2026-03-30 15:06 ` Titouan Christophe via buildroot
  2026-04-14 15:44   ` Thomas Perale via buildroot
  2026-03-30 20:07 ` [Buildroot] [PATCH 1/2] package/cpp-httplib: security bump to v0.37.2 Julien Olivain via buildroot
  2026-04-14 15:44 ` Thomas Perale via buildroot
  2 siblings, 1 reply; 5+ messages in thread
From: Titouan Christophe via buildroot @ 2026-03-30 15:06 UTC (permalink / raw)
  To: buildroot; +Cc: Aleksandr Makarov

See the release notes:

- https://github.com/yhirose/cpp-httplib/releases/tag/v0.38.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.39.0
- https://github.com/yhirose/cpp-httplib/releases/tag/v0.40.0

Signed-off-by: Titouan Christophe <titouan.christophe@mind.be>
---
 package/cpp-httplib/cpp-httplib.hash | 2 +-
 package/cpp-httplib/cpp-httplib.mk   | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/package/cpp-httplib/cpp-httplib.hash b/package/cpp-httplib/cpp-httplib.hash
index 076b30cfa1..eb2b77bcd8 100644
--- a/package/cpp-httplib/cpp-httplib.hash
+++ b/package/cpp-httplib/cpp-httplib.hash
@@ -1,3 +1,3 @@
 # Locally computed:
-sha256  909766cd7697153c9e588b0f96defe1868b7bb11d94b8d4f0c83bb4875bc9066  cpp-httplib-0.37.2.tar.gz
+sha256  b52ecaebf0f94086c8b3305650412359d920c5267f6d9ce87f883198783af678  cpp-httplib-0.40.0.tar.gz
 sha256  4b45cbe16d7b71b89ae6127e26e0d90a029198ca5e958ad8e3d0b8bbed364d8b  LICENSE
diff --git a/package/cpp-httplib/cpp-httplib.mk b/package/cpp-httplib/cpp-httplib.mk
index 56e8c27fc4..5cc60565c6 100644
--- a/package/cpp-httplib/cpp-httplib.mk
+++ b/package/cpp-httplib/cpp-httplib.mk
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-CPP_HTTPLIB_VERSION = 0.37.2
+CPP_HTTPLIB_VERSION = 0.40.0
 CPP_HTTPLIB_SITE = $(call github,yhirose,cpp-httplib,v$(CPP_HTTPLIB_VERSION))
 CPP_HTTPLIB_LICENSE = MIT
 CPP_HTTPLIB_LICENSE_FILES = LICENSE
-- 
2.53.0

_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [Buildroot] [PATCH 1/2] package/cpp-httplib: security bump to v0.37.2
  2026-03-30 15:06 [Buildroot] [PATCH 1/2] package/cpp-httplib: security bump to v0.37.2 Titouan Christophe via buildroot
  2026-03-30 15:06 ` [Buildroot] [PATCH 2/2] package/cpp-httplib: bump to v0.40.0 Titouan Christophe via buildroot
@ 2026-03-30 20:07 ` Julien Olivain via buildroot
  2026-04-14 15:44 ` Thomas Perale via buildroot
  2 siblings, 0 replies; 5+ messages in thread
From: Julien Olivain via buildroot @ 2026-03-30 20:07 UTC (permalink / raw)
  To: Titouan Christophe; +Cc: buildroot, Aleksandr Makarov

On 30/03/2026 17:06, Titouan Christophe via buildroot wrote:
[...]
> Signed-off-by: Titouan Christophe <titouan.christophe@mind.be>

Series applied to master, thanks.
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [Buildroot] [PATCH 2/2] package/cpp-httplib: bump to v0.40.0
  2026-03-30 15:06 ` [Buildroot] [PATCH 2/2] package/cpp-httplib: bump to v0.40.0 Titouan Christophe via buildroot
@ 2026-04-14 15:44   ` Thomas Perale via buildroot
  0 siblings, 0 replies; 5+ messages in thread
From: Thomas Perale via buildroot @ 2026-04-14 15:44 UTC (permalink / raw)
  To: Titouan Christophe; +Cc: Thomas Perale, buildroot

In reply of:
> See the release notes:
> 
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.38.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.39.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.40.0
> 
> Signed-off-by: Titouan Christophe <titouan.christophe@mind.be>

Applied to 2025.02.x & 2026.02.x. Thanks

> ---
>  package/cpp-httplib/cpp-httplib.hash | 2 +-
>  package/cpp-httplib/cpp-httplib.mk   | 2 +-
>  2 files changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/package/cpp-httplib/cpp-httplib.hash b/package/cpp-httplib/cpp-httplib.hash
> index 076b30cfa1..eb2b77bcd8 100644
> --- a/package/cpp-httplib/cpp-httplib.hash
> +++ b/package/cpp-httplib/cpp-httplib.hash
> @@ -1,3 +1,3 @@
>  # Locally computed:
> -sha256  909766cd7697153c9e588b0f96defe1868b7bb11d94b8d4f0c83bb4875bc9066  cpp-httplib-0.37.2.tar.gz
> +sha256  b52ecaebf0f94086c8b3305650412359d920c5267f6d9ce87f883198783af678  cpp-httplib-0.40.0.tar.gz
>  sha256  4b45cbe16d7b71b89ae6127e26e0d90a029198ca5e958ad8e3d0b8bbed364d8b  LICENSE
> diff --git a/package/cpp-httplib/cpp-httplib.mk b/package/cpp-httplib/cpp-httplib.mk
> index 56e8c27fc4..5cc60565c6 100644
> --- a/package/cpp-httplib/cpp-httplib.mk
> +++ b/package/cpp-httplib/cpp-httplib.mk
> @@ -4,7 +4,7 @@
>  #
>  ################################################################################
>  
> -CPP_HTTPLIB_VERSION = 0.37.2
> +CPP_HTTPLIB_VERSION = 0.40.0
>  CPP_HTTPLIB_SITE = $(call github,yhirose,cpp-httplib,v$(CPP_HTTPLIB_VERSION))
>  CPP_HTTPLIB_LICENSE = MIT
>  CPP_HTTPLIB_LICENSE_FILES = LICENSE
> -- 
> 2.53.0
> 
> _______________________________________________
> buildroot mailing list
> buildroot@buildroot.org
> https://lists.buildroot.org/mailman/listinfo/buildroot
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [Buildroot] [PATCH 1/2] package/cpp-httplib: security bump to v0.37.2
  2026-03-30 15:06 [Buildroot] [PATCH 1/2] package/cpp-httplib: security bump to v0.37.2 Titouan Christophe via buildroot
  2026-03-30 15:06 ` [Buildroot] [PATCH 2/2] package/cpp-httplib: bump to v0.40.0 Titouan Christophe via buildroot
  2026-03-30 20:07 ` [Buildroot] [PATCH 1/2] package/cpp-httplib: security bump to v0.37.2 Julien Olivain via buildroot
@ 2026-04-14 15:44 ` Thomas Perale via buildroot
  2 siblings, 0 replies; 5+ messages in thread
From: Thomas Perale via buildroot @ 2026-04-14 15:44 UTC (permalink / raw)
  To: Titouan Christophe; +Cc: Thomas Perale, buildroot

In reply of:
> See the release notes of intermediate versions:
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.28.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.29.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.30.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.30.1
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.30.2
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.31.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.32.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.33.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.33.1
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.34.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.35.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.36.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.37.0
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.37.1
> - https://github.com/yhirose/cpp-httplib/releases/tag/v0.37.2
> 
> This fixes numerous vulnerabilities:
> 
> - CVE-2026-21428:
>     cpp-httplib is a C++11 single-file header-only cross platform
>     HTTP/HTTPS library. Prior to version 0.30.0, the ``write_headers``
>     function does not check for CR & LF characters in user supplied
>     headers, allowing untrusted header value to escape header lines. This
>     vulnerability allows attackers to add extra headers, modify request
>     body unexpectedly & trigger an SSRF attack. When combined with a
>     server that supports http1.1 pipelining (springboot, python twisted
>     etc), this can be used for server side request forgery (SSRF). Version
>     0.30.0 fixes this issue.
>     https://www.cve.org/CVERecord?id=CVE-2026-21428
> 
> - CVE-2026-22776:
>     cpp-httplib is a C++11 single-file header-only cross platform
>     HTTP/HTTPS library. Prior to version 0.30.1, a Denial of Service (DoS)
>     vulnerability exists in cpp-httplib due to the unsafe handling of
>     compressed HTTP request bodies (Content-Encoding: gzip, br, etc.). The
>     library validates the payload_max_length against the compressed data
>     size received from the network, but does not limit the size of the
>     decompressed data stored in memory.
>     https://www.cve.org/CVERecord?id=CVE-2026-22776
> 
> - CVE-2026-28434:
>     cpp-httplib is a C++11 single-file header-only cross platform
>     HTTP/HTTPS library. Prior to 0.35.0, when a request handler throws a
>     C++ exception and the application has not registered a custom
>     exception handler via set_exception_handler(), the library catches the
>     exception and writes its message directly into the HTTP response as a
>     header named EXCEPTION_WHAT. This header is sent to whoever made the
>     request, with no authentication check and no special configuration
>     required to trigger it. The behavior is on by default. A developer who
>     does not know to opt in to set_exception_handler() will ship a server
>     that leaks internal exception messages to any client. This
>     vulnerability is fixed in 0.35.0.
>     https://www.cve.org/CVERecord?id=CVE-2026-28434
> 
> - CVE-2026-28435:
>     cpp-httplib is a C++11 single-file header-only cross platform
>     HTTP/HTTPS library. Prior to 0.35.0, cpp-httplib (httplib.h) does not
>     enforce Server::set_payload_max_length() on the decompressed request
>     body when using HandlerWithContentReader (streaming ContentReader)
>     with Content-Encoding: gzip (or other supported encodings). A small
>     compressed payload can expand beyond the configured payload limit and
>     be processed by the application, enabling a payload size limit bypass
>     and potential denial of service (CPU/memory exhaustion). This
>     vulnerability is fixed in 0.35.0.
>     https://www.cve.org/CVERecord?id=CVE-2026-28435
> 
> - CVE-2026-29076:
>     cpp-httplib is a C++11 single-file header-only cross platform
>     HTTP/HTTPS library. Prior to version 0.37.0, cpp-httplib uses
>     std::regex (libstdc++) to parse RFC 5987 encoded filename* values in
>     multipart Content-Disposition headers. The regex engine in libstdc++
>     implements backtracking via deep recursion, consuming one stack frame
>     per input character. An attacker can send a single HTTP POST request
>     with a crafted filename* parameter that causes uncontrolled stack
>     growth, resulting in a stack overflow (SIGSEGV) that crashes the
>     server process. This issue has been patched in version 0.37.0.
>     https://www.cve.org/CVERecord?id=CVE-2026-29076
> 
> - CVE-2026-31870:
>     cpp-httplib is a C++11 single-file header-only cross platform
>     HTTP/HTTPS library. Prior to 0.37.1, when a cpp-httplib client uses
>     the streaming API (httplib::stream::Get, httplib::stream::Post, etc.),
>     the library calls std::stoull() directly on the Content-Length header
>     value received from the server with no input validation and no
>     exception handling. std::stoull throws std::invalid_argument for non-
>     numeric strings and std::out_of_range for values exceeding ULLONG_MAX.
>     Since nothing catches these exceptions, the C++ runtime calls
>     std::terminate(), which kills the process with SIGABRT. Any server the
>     client connects to — including servers reached via HTTP redirects,
>     third-party APIs, or man-in-the-middle positions can crash the client
>     application with a single HTTP response. No authentication is
>     required. No interaction from the end user is required. The crash is
>     deterministic and immediate. This vulnerability is fixed in 0.37.1.
>     https://www.cve.org/CVERecord?id=CVE-2026-31870
> 
> - CVE-2026-32627:
>     cpp-httplib is a C++11 single-file header-only cross platform
>     HTTP/HTTPS library. Prior to 0.37.2, when a cpp-httplib client is
>     configured with a proxy and set_follow_location(true), any HTTPS
>     redirect it follows will have TLS certificate and hostname
>     verification silently disabled on the new connection. The client will
>     accept any certificate presented by the redirect target — expired,
>     self-signed, or forged — without raising an error or notifying the
>     application. A network attacker in a position to return a redirect
>     response can fully intercept the follow-up HTTPS connection, including
>     any credentials or session tokens in flight. This vulnerability is
>     fixed in 0.37.2.
>     https://www.cve.org/CVERecord?id=CVE-2026-32627
> 
> Signed-off-by: Titouan Christophe <titouan.christophe@mind.be>

Applied to 2025.02.x & 2026.02.x. Thanks

> ---
>  package/cpp-httplib/cpp-httplib.hash | 2 +-
>  package/cpp-httplib/cpp-httplib.mk   | 2 +-
>  2 files changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/package/cpp-httplib/cpp-httplib.hash b/package/cpp-httplib/cpp-httplib.hash
> index 904bca6d02..076b30cfa1 100644
> --- a/package/cpp-httplib/cpp-httplib.hash
> +++ b/package/cpp-httplib/cpp-httplib.hash
> @@ -1,3 +1,3 @@
>  # Locally computed:
> -sha256  cc57615af359efda816122dcfca37bcbb9f1591396f50a1fd1ad70bbe6050581  cpp-httplib-0.27.0.tar.gz
> +sha256  909766cd7697153c9e588b0f96defe1868b7bb11d94b8d4f0c83bb4875bc9066  cpp-httplib-0.37.2.tar.gz
>  sha256  4b45cbe16d7b71b89ae6127e26e0d90a029198ca5e958ad8e3d0b8bbed364d8b  LICENSE
> diff --git a/package/cpp-httplib/cpp-httplib.mk b/package/cpp-httplib/cpp-httplib.mk
> index ed5c33d2a5..56e8c27fc4 100644
> --- a/package/cpp-httplib/cpp-httplib.mk
> +++ b/package/cpp-httplib/cpp-httplib.mk
> @@ -4,7 +4,7 @@
>  #
>  ################################################################################
>  
> -CPP_HTTPLIB_VERSION = 0.27.0
> +CPP_HTTPLIB_VERSION = 0.37.2
>  CPP_HTTPLIB_SITE = $(call github,yhirose,cpp-httplib,v$(CPP_HTTPLIB_VERSION))
>  CPP_HTTPLIB_LICENSE = MIT
>  CPP_HTTPLIB_LICENSE_FILES = LICENSE
> -- 
> 2.53.0
> 
> _______________________________________________
> buildroot mailing list
> buildroot@buildroot.org
> https://lists.buildroot.org/mailman/listinfo/buildroot
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2026-04-14 15:46 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-03-30 15:06 [Buildroot] [PATCH 1/2] package/cpp-httplib: security bump to v0.37.2 Titouan Christophe via buildroot
2026-03-30 15:06 ` [Buildroot] [PATCH 2/2] package/cpp-httplib: bump to v0.40.0 Titouan Christophe via buildroot
2026-04-14 15:44   ` Thomas Perale via buildroot
2026-03-30 20:07 ` [Buildroot] [PATCH 1/2] package/cpp-httplib: security bump to v0.37.2 Julien Olivain via buildroot
2026-04-14 15:44 ` Thomas Perale via buildroot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox