gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Sep 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 |
Fri, 30 Aug 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat advanced Cluster Security
|
|
CPEs | cpe:/a:redhat:advanced_cluster_security:4.4::el8 | |
Vendors & Products |
Redhat advanced Cluster Security
|
Tue, 20 Aug 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:rhel_eus:9.2 |
Mon, 19 Aug 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.12::el8 |
Tue, 13 Aug 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat enterprise Linux
|
|
CPEs | cpe:/a:redhat:enterprise_linux:8 | |
Vendors & Products |
Redhat enterprise Linux
|
Mon, 12 Aug 2024 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:rhel_eus:8.8 | |
Vendors & Products |
Redhat rhel Eus
|
Wed, 07 Aug 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.14::el8 |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T03:50:55.675Z
Reserved: 2024-06-05T20:10:46.496Z
Link: CVE-2024-37298

Updated: 2024-07-03T20:12:45.502Z

Status : Awaiting Analysis
Published: 2024-07-01T19:15:04.283
Modified: 2024-11-21T09:23:33.653
Link: CVE-2024-37298
