CVE-2024-51502

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-51502
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-51502.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-51502
Aliases
Published
2024-11-04T23:15:05Z
Modified
2024-11-05T18:46:16.678013Z
Summary
[none]
Details

loona is an experimental, HTTP/1.1 and HTTP/2 implementation in Rust on top of io-uring. loona-hpack suffers from the same vulnerability as the original hpack as documented in issue #11. All users who try to decode untrusted input using the Decoder are vulnerable to this exploit. This issue has been addressed in release version 0.4.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/bearcove/loona

Affected ranges

Type
GIT
Repo
https://github.com/bearcove/loona
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

b-x-v1.*

b-x-v1.0.0
b-x-v1.0.1

buffet-v0.*

buffet-v0.2.0
buffet-v0.2.1
buffet-v0.3.0
buffet-v0.3.1

fluke-buffet-v0.*

fluke-buffet-v0.1.0
fluke-buffet-v0.2.0

fluke-h2-parse-v0.*

fluke-h2-parse-v0.1.0
fluke-h2-parse-v0.1.1

fluke-hpack-v0.*

fluke-hpack-v0.3.0
fluke-hpack-v0.3.1

fluke-io-uring-async-v0.*

fluke-io-uring-async-v0.1.0

fluke-maybe-uring-v0.*

fluke-maybe-uring-v0.1.0
fluke-maybe-uring-v0.1.1

fluke-v0.*

fluke-v0.1.0
fluke-v0.1.1

httpwg-cli-v0.*

httpwg-cli-v0.2.1
httpwg-cli-v0.2.2
httpwg-cli-v0.2.3

httpwg-macros-v0.*

httpwg-macros-v0.1.0
httpwg-macros-v0.2.1
httpwg-macros-v0.2.2
httpwg-macros-v0.2.3

httpwg-v0.*

httpwg-v0.1.0
httpwg-v0.1.1
httpwg-v0.2.0
httpwg-v0.2.1
httpwg-v0.2.2
httpwg-v0.2.3
httpwg-v0.2.4

loona-h2-v0.*

loona-h2-v0.2.0
loona-h2-v0.2.1
loona-h2-v0.3.0
loona-h2-v0.4.0
loona-h2-v0.4.1

loona-hpack-v0.*

loona-hpack-v0.3.1
loona-hpack-v0.3.2
loona-hpack-v0.4.0
loona-hpack-v0.4.1
loona-hpack-v0.4.2

loona-v0.*

loona-v0.2.1
loona-v0.3.0
loona-v0.3.1

luring-v0.*

luring-v0.1.0
luring-v0.1.1