VYPR
Medium severityNVD Advisory· Published Nov 4, 2024· Updated Apr 15, 2026

CVE-2024-51502

CVE-2024-51502

Description

loona is an experimental, HTTP/1.1 and HTTP/2 implementation in Rust on top of io-uring. loona-hpack suffers from the same vulnerability as the original hpack as documented in issue #11. All users who try to decode untrusted input using the Decoder are vulnerable to this exploit. This issue has been addressed in release version 0.4.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
loona-hpackcrates.io
< 0.4.30.4.3

Patches

2
9a4028ec6484

Merge commit from fork

https://github.com/bearcove/loonaAmos WengerNov 3, 2024via ghsa
1 file changed · +1 1
  • crates/loona-hpack/src/decoder.rs+1 1 modified
    @@ -535,7 +535,7 @@ impl<'a> Decoder<'a> {
         ///
         /// Returns the number of octets consumed from the given buffer.
         fn update_max_dynamic_size(&mut self, buf: &[u8]) -> Result<usize, DecoderError> {
    -        let (new_size, consumed) = decode_integer(buf, 5).ok().unwrap();
    +        let (new_size, consumed) = decode_integer(buf, 5)?;
             if let Some(max_size) = self.max_allowed_table_size {
                 if new_size > max_size {
                     return Err(DecoderError::InvalidMaxDynamicSize);
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.