Bug ID | 1227309 |
---|---|
Summary | VUL-0: CVE-2024-37298: distrobuilder: gorilla/schema: potential memory exhaustion due to sparse slice deserialization |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.6 |
Hardware | Other |
URL | https://smash.suse.de/issue/412571/ |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | containers-bugowner@suse.de |
Reporter | smash_bz@suse.de |
QA Contact | security-team@suse.de |
CC | camila.matos@suse.com |
Target Milestone | --- |
Found By | Security Response Team |
Blocker | --- |
gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-37298 https://www.cve.org/CVERecord?id=CVE-2024-37298 https://github.com/gorilla/schema/blob/main/decoder.go#L223 https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3 https://bugzilla.redhat.com/show_bug.cgi?id=2295010