CVE-2025-58183
BaseFortify
Publication date: 2025-10-29
Last updated on: 2025-11-04
Assigner: Go Project
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| golang | go | From 1.25.0 (inc) to 1.25.2 (inc) |
| golang | archive | tar |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in tar.Reader involves not setting a maximum limit on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. This means that a specially crafted archive with many sparse regions can cause the Reader to load an unbounded amount of data into memory, potentially leading to excessive memory usage. When the archive is compressed, even a small compressed file can cause very large memory allocations during decompression.
How can this vulnerability impact me? :
This vulnerability can impact you by causing your system or application to consume excessive memory when processing maliciously crafted tar archives. This can lead to performance degradation, crashes, or denial of service due to resource exhaustion.