CVE-2026-32239

Name
CVE-2026-32239
Description
Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, a negative Content-Length value was converted to unsigned, treating it as an impossibly large length instead. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
security-advisories@github.com https://capnproto.org/capnproto-c++-1.4.0.tar.gz
security-advisories@github.com https://capnproto.org/capnproto-c++-win32-1.4.0.zip
security-advisories@github.com https://github.com/capnproto/capnproto/commit/2744b3c012b4aa3c31cefb61ec656829fa5c0e36
security-advisories@github.com https://github.com/capnproto/capnproto/commit/e929f0ba7901a6b8f4b5ba9a4db00af43288cbb0
security-advisories@github.com https://github.com/capnproto/capnproto/security/advisories/GHSA-qjx3-pp3m-9jpm

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:capnproto:capnproto:*:*:*:*:*:*:*:* capnproto >= None < 1.4.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
capnproto edge-community 1.3.0-r0 Luca Weiss <luca@lucaweiss.eu> possibly vulnerable
capnproto edge-community 1.2.0-r0 Luca Weiss <luca@lucaweiss.eu> possibly vulnerable
capnproto edge-community 1.1.0-r0 Luca Weiss <luca@lucaweiss.eu> possibly vulnerable
capnproto edge-community 1.0.2-r2 Luca Weiss <luca@lucaweiss.eu> possibly vulnerable
capnproto 3.23-community 1.2.0-r0 Luca Weiss <luca@lucaweiss.eu> possibly vulnerable