Upstream information
CVE-2024-37298 at MITRE
Description
gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
SUSE Bugzilla entry: 
1227309 [NEW]
SUSE Security Advisories:
List of released packages
| Product(s) |  Fixed package version(s) |  References | 
| SUSE Liberty Linux 8 |  aardvark-dns >= 1.10.0-1.module+el8.10.0+22202+761b9a65 
 buildah >= 1.33.8-4.module+el8.10.0+22202+761b9a65 
 buildah-tests >= 1.33.8-4.module+el8.10.0+22202+761b9a65 
 cockpit-podman >= 84.1-1.module+el8.10.0+22202+761b9a65 
 conmon >= 2.1.10-1.module+el8.10.0+22202+761b9a65 
 container-selinux >= 2.229.0-2.module+el8.10.0+22202+761b9a65 
 containernetworking-plugins >= 1.4.0-5.module+el8.10.0+22202+761b9a65 
 containers-common >= 1-82.module+el8.10.0+22202+761b9a65 
 crit >= 3.18-5.module+el8.10.0+22202+761b9a65 
 criu >= 3.18-5.module+el8.10.0+22202+761b9a65 
 criu-devel >= 3.18-5.module+el8.10.0+22202+761b9a65 
 criu-libs >= 3.18-5.module+el8.10.0+22202+761b9a65 
 crun >= 1.14.3-2.module+el8.10.0+22202+761b9a65 
 fuse-overlayfs >= 1.13-1.module+el8.10.0+22202+761b9a65 
 libslirp >= 4.4.0-2.module+el8.10.0+22202+761b9a65 
 libslirp-devel >= 4.4.0-2.module+el8.10.0+22202+761b9a65 
 netavark >= 1.10.3-1.module+el8.10.0+22202+761b9a65 
 oci-seccomp-bpf-hook >= 1.2.10-1.module+el8.10.0+22202+761b9a65 
 podman >= 4.9.4-12.module+el8.10.0+22202+761b9a65 
 podman-catatonit >= 4.9.4-12.module+el8.10.0+22202+761b9a65 
 podman-docker >= 4.9.4-12.module+el8.10.0+22202+761b9a65 
 podman-gvproxy >= 4.9.4-12.module+el8.10.0+22202+761b9a65 
 podman-plugins >= 4.9.4-12.module+el8.10.0+22202+761b9a65 
 podman-remote >= 4.9.4-12.module+el8.10.0+22202+761b9a65 
 podman-tests >= 4.9.4-12.module+el8.10.0+22202+761b9a65 
 python3-criu >= 3.18-5.module+el8.10.0+22202+761b9a65 
 python3-podman >= 4.9.0-2.module+el8.10.0+22202+761b9a65 
 runc >= 1.1.12-4.module+el8.10.0+22202+761b9a65 
 skopeo >= 1.14.5-3.module+el8.10.0+22202+761b9a65 
 skopeo-tests >= 1.14.5-3.module+el8.10.0+22202+761b9a65 
 slirp4netns >= 1.2.3-1.module+el8.10.0+22202+761b9a65 
 toolbox >= 0.0.99.5-2.module+el8.10.0+22202+761b9a65 
 toolbox-tests >= 0.0.99.5-2.module+el8.10.0+22202+761b9a65 
 udica >= 0.2.6-21.module+el8.10.0+22202+761b9a65 
  |  Patchnames:  RHSA-2024:5258 | 
| SUSE Liberty Linux 9 |  podman >= 4.9.4-10.el9_4 
 podman-docker >= 4.9.4-10.el9_4 
 podman-plugins >= 4.9.4-10.el9_4 
 podman-remote >= 4.9.4-10.el9_4 
 podman-tests >= 4.9.4-10.el9_4 
  |  Patchnames:  RHSA-2024:6194 | 
SUSE Timeline for this CVE
CVE page created: Mon Jul  1 22:00:57 2024
CVE page last modified: Thu Sep 26 13:49:09 2024