cve/2024/CVE-2024-51502.md

18 lines
1016 B
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-51502](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51502)
![](https://img.shields.io/static/v1?label=Product&message=loona&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=%3C%200.4.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
loona is an experimental, HTTP/1.1 and HTTP/2 implementation in Rust on top of io-uring. `loona-hpack` suffers from the same vulnerability as the original `hpack` as documented in issue #11. All users who try to decode untrusted input using the Decoder are vulnerable to this exploit. This issue has been addressed in release version 0.4.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
- https://github.com/bearcove/loona/security/advisories/GHSA-7vm6-qwh5-9x44
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
2025-09-29 16:08:36 +00:00