DEBIAN-CVE-2024-37298

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2024-37298
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-37298.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-37298
Upstream
Published
2024-07-01T19:15:04Z
Modified
2025-09-19T06:05:39Z
Summary
[none]
Details

gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running schema.Decoder.Decode() on a struct that has a field of type []struct{...} opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of schema.Decoder.Decode() on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.

References

Affected packages

Debian:13 / golang-github-gorilla-schema

Package

Name
golang-github-gorilla-schema
Purl
pkg:deb/debian/golang-github-gorilla-schema?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / golang-github-gorilla-schema

Package

Name
golang-github-gorilla-schema
Purl
pkg:deb/debian/golang-github-gorilla-schema?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}