Skip to content

Commit 0bfd4cc

Browse files
neildgopherbot
authored andcommitted
data/reports: add GO-2025-4014
- data/reports/GO-2025-4014.yaml Fixes #4014 Change-Id: I02ba81277e322ebe606926013486dd5ebd5c575d Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/715923 LUCI-TryBot-Result: Go LUCI <[email protected]> Auto-Submit: Damien Neil <[email protected]> Reviewed-by: Roland Shoemaker <[email protected]>
1 parent 9003a17 commit 0bfd4cc

File tree

3 files changed

+191
-0
lines changed

3 files changed

+191
-0
lines changed

data/cve/v5/GO-2025-4014.json

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
{
2+
"dataType": "CVE_RECORD",
3+
"dataVersion": "5.0",
4+
"cveMetadata": {
5+
"cveId": "CVE-2025-58183"
6+
},
7+
"containers": {
8+
"cna": {
9+
"providerMetadata": {
10+
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
11+
},
12+
"title": "Unbounded allocation when parsing GNU sparse map in archive/tar",
13+
"descriptions": [
14+
{
15+
"lang": "en",
16+
"value": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations."
17+
}
18+
],
19+
"affected": [
20+
{
21+
"vendor": "Go standard library",
22+
"product": "archive/tar",
23+
"collectionURL": "https://pkg.go.dev",
24+
"packageName": "archive/tar",
25+
"versions": [
26+
{
27+
"version": "0",
28+
"lessThan": "1.24.8",
29+
"status": "affected",
30+
"versionType": "semver"
31+
},
32+
{
33+
"version": "1.25.0",
34+
"lessThan": "1.25.2",
35+
"status": "affected",
36+
"versionType": "semver"
37+
}
38+
],
39+
"programRoutines": [
40+
{
41+
"name": "readGNUSparseMap1x0"
42+
},
43+
{
44+
"name": "Reader.Next"
45+
}
46+
],
47+
"defaultStatus": "unaffected"
48+
}
49+
],
50+
"problemTypes": [
51+
{
52+
"descriptions": [
53+
{
54+
"lang": "en",
55+
"description": "CWE-400: Uncontrolled Resource Consumption"
56+
}
57+
]
58+
}
59+
],
60+
"references": [
61+
{
62+
"url": "https://go.dev/cl/709861"
63+
},
64+
{
65+
"url": "https://go.dev/issue/75677"
66+
},
67+
{
68+
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
69+
},
70+
{
71+
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
72+
}
73+
],
74+
"credits": [
75+
{
76+
"lang": "en",
77+
"value": "Harshit Gupta (Mr HAX)"
78+
}
79+
]
80+
}
81+
}
82+
}

data/osv/GO-2025-4014.json

Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2025-4014",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2025-58183",
8+
"CVE-2025-58183"
9+
],
10+
"summary": "Unbounded allocation when parsing GNU sparse map in archive/tar",
11+
"details": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "stdlib",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "1.24.8"
27+
},
28+
{
29+
"introduced": "1.25.0"
30+
},
31+
{
32+
"fixed": "1.25.2"
33+
}
34+
]
35+
}
36+
],
37+
"ecosystem_specific": {
38+
"imports": [
39+
{
40+
"path": "archive/tar",
41+
"symbols": [
42+
"Reader.Next",
43+
"readGNUSparseMap1x0"
44+
]
45+
}
46+
]
47+
}
48+
}
49+
],
50+
"references": [
51+
{
52+
"type": "FIX",
53+
"url": "https://go.dev/cl/709861"
54+
},
55+
{
56+
"type": "REPORT",
57+
"url": "https://go.dev/issue/75677"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
62+
}
63+
],
64+
"credits": [
65+
{
66+
"name": "Harshit Gupta (Mr HAX)"
67+
}
68+
],
69+
"database_specific": {
70+
"url": "https://pkg.go.dev/vuln/GO-2025-4014",
71+
"review_status": "REVIEWED"
72+
}
73+
}

data/reports/GO-2025-4014.yaml

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
id: GO-2025-4014
2+
modules:
3+
- module: std
4+
versions:
5+
- fixed: 1.24.8
6+
- introduced: 1.25.0
7+
- fixed: 1.25.2
8+
vulnerable_at: 1.25.1
9+
packages:
10+
- package: archive/tar
11+
symbols:
12+
- readGNUSparseMap1x0
13+
derived_symbols:
14+
- Reader.Next
15+
summary: Unbounded allocation when parsing GNU sparse map in archive/tar
16+
description: |-
17+
tar.Reader does not set a maximum size on the number of sparse region data
18+
blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing
19+
a large number of sparse regions can cause a Reader to read an unbounded amount
20+
of data from the archive into memory. When reading from a compressed source, a
21+
small compressed input can result in large allocations.
22+
cves:
23+
- CVE-2025-58183
24+
credits:
25+
- Harshit Gupta (Mr HAX)
26+
references:
27+
- fix: https://go.dev/cl/709861
28+
- report: https://go.dev/issue/75677
29+
- web: https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI
30+
cve_metadata:
31+
id: CVE-2025-58183
32+
cwe: 'CWE-400: Uncontrolled Resource Consumption'
33+
source:
34+
id: go-security-team
35+
created: 2025-10-28T18:38:44.460157-07:00
36+
review_status: REVIEWED

0 commit comments

Comments
 (0)