Bug ID 1227309
Summary VUL-0: CVE-2024-37298: distrobuilder: gorilla/schema: potential memory exhaustion due to sparse slice deserialization
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/412571/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee containers-bugowner@suse.de
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC camila.matos@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

gorilla/schema converts structs to and from form values. Prior to version 1.4.1
Running `schema.Decoder.Decode()` on a struct that has a field of type
`[]struct{...}` opens it up to malicious attacks regarding memory allocations,
taking advantage of the sparse slice functionality. Any use of
`schema.Decoder.Decode()` on a struct with arrays of other structs could be
vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a
patch for the issue.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-37298
https://www.cve.org/CVERecord?id=CVE-2024-37298
https://github.com/gorilla/schema/blob/main/decoder.go#L223
https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff
https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3
https://bugzilla.redhat.com/show_bug.cgi?id=2295010


You are receiving this mail because: