Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/golang-github-gorilla-schema@1.2.0-2
purl pkg:deb/debian/golang-github-gorilla-schema@1.2.0-2
Next non-vulnerable version 1.4.1-1
Latest non-vulnerable version 1.4.1-1
Risk 4.0
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-fcfw-7u4r-ebf8
Aliases:
CVE-2024-37298
GHSA-3669-72x9-r9p3
Potential memory exhaustion attack due to sparse slice deserialization ### Details Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. For instance, in the Proof of Concept written below, someone can specify to set a field of the billionth element and it will allocate all other elements before it in the slice. In the local environment environment for my project, I was able to call an endpoint like `/innocent_endpoint?arr.10000000.X=1` and freeze my system from the memory allocation while parsing `r.Form`. I think [this line](https://github.com/gorilla/schema/blob/main/decoder.go#L223) is responsible for allocating the slice, although I haven't tested to make sure, so it's just an educated guess. ### Proof of Concept The following proof of concept works on both v1.2.0 and v1.2.1. I have not tested earlier versions. ```go package main import ( "fmt" "github.com/gorilla/schema" ) func main() { dec := schema.NewDecoder() var result struct { Arr []struct{ Val int } } if err := dec.Decode(&result, map[string][]string{"arr.1000000000.Val": {"1"}}); err != nil { panic(err) } fmt.Printf("%#+v\n", result) } ``` ### Impact Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. There seems to be no possible solution that a developer using this library can do to disable this behaviour without fixing it in this project, so all uses of Decode that fall under this umbrella are affected. A fix that doesn't require a major change may also be harder to find, since it could break compatibility with some other intended use-cases.
1.4.1-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T09:36:44.608886+00:00 Debian Importer Affected by VCID-fcfw-7u4r-ebf8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-11T18:24:00.872590+00:00 Debian Importer Affected by VCID-fcfw-7u4r-ebf8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-04T18:08:14.232466+00:00 Debian Importer Affected by VCID-fcfw-7u4r-ebf8 https://security-tracker.debian.org/tracker/data/json 38.1.0