CVE-2026-32240

Name
CVE-2026-32240
Description
Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
security-advisories@github.com https://capnproto.org/capnproto-c++-1.4.0.tar.gz
security-advisories@github.com https://capnproto.org/capnproto-c++-win32-1.4.0.zip
security-advisories@github.com https://github.com/capnproto/capnproto/commit/2744b3c012b4aa3c31cefb61ec656829fa5c0e36
security-advisories@github.com https://github.com/capnproto/capnproto/commit/e929f0ba7901a6b8f4b5ba9a4db00af43288cbb0
security-advisories@github.com https://github.com/capnproto/capnproto/security/advisories/GHSA-vpcq-mx5v-32wm

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:capnproto:capnproto:*:*:*:*:*:*:*:* capnproto >= None < 1.4.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
capnproto edge-community 1.3.0-r0 Luca Weiss <luca@lucaweiss.eu> possibly vulnerable
capnproto edge-community 1.2.0-r0 Luca Weiss <luca@lucaweiss.eu> possibly vulnerable
capnproto edge-community 1.1.0-r0 Luca Weiss <luca@lucaweiss.eu> possibly vulnerable
capnproto edge-community 1.0.2-r2 Luca Weiss <luca@lucaweiss.eu> possibly vulnerable
capnproto 3.23-community 1.2.0-r0 Luca Weiss <luca@lucaweiss.eu> possibly vulnerable