Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58183: CWE-400: Uncontrolled Resource Consumption in Go standard library archive/tar

0
Medium
VulnerabilityCVE-2025-58183cvecve-2025-58183cwe-400
Published: Wed Oct 29 2025 (10/29/2025, 22:10:14 UTC)
Source: CVE Database V5
Vendor/Project: Go standard library
Product: archive/tar

Description

tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.

AI-Powered Analysis

AILast updated: 11/05/2025, 23:21:52 UTC

Technical Analysis

CVE-2025-58183 is a resource exhaustion vulnerability classified under CWE-400 affecting the Go standard library's archive/tar package, specifically the tar.Reader component. The issue stems from the Reader's failure to impose a maximum limit on the number of sparse region data blocks when processing GNU tar pax 1.0 sparse files. Sparse files use metadata to represent large files with empty regions efficiently. However, a maliciously crafted tar archive can contain an excessive number of sparse regions, causing the tar.Reader to allocate an unbounded amount of memory while reading these regions. This problem is exacerbated when the archive is compressed, as a small compressed input can decompress into a very large memory allocation, leading to potential denial of service (DoS) conditions due to memory exhaustion. The vulnerability affects all versions of the Go archive/tar package up to and including version 1.25.0. Exploitation requires no privileges but does require user interaction in the form of processing a crafted archive file. There are no known public exploits or patches available at the time of publication. The CVSS v3.1 base score is 4.3 (medium), reflecting network attack vector, low complexity, no privileges required, user interaction needed, and impact limited to availability (memory exhaustion). This vulnerability is particularly relevant for applications and services that automatically process tar archives, such as CI/CD pipelines, container image extraction, backup and restore tools, and cloud-native applications written in Go.

Potential Impact

For European organizations, the primary impact of CVE-2025-58183 is the risk of denial of service through memory exhaustion when processing malicious tar archives. This can disrupt critical services that rely on Go-based software for handling tar files, including container orchestration platforms (e.g., Kubernetes components written in Go), cloud infrastructure tools, and automated deployment pipelines. Memory exhaustion can lead to application crashes, degraded performance, or system instability, potentially causing downtime and operational disruption. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can affect business continuity and service reliability. Organizations with automated workflows that ingest untrusted tar archives or compressed tarballs are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate the risk, especially as attackers may develop exploits over time. Additionally, the vulnerability could be leveraged in multi-stage attacks to cause disruption or as a vector to trigger failover mechanisms, increasing operational costs and complexity.

Mitigation Recommendations

To mitigate CVE-2025-58183, European organizations should: 1) Update Go to a version beyond 1.25.0 once a patch is released that enforces limits on sparse region counts in tar.Reader. 2) Implement input validation and limit processing of untrusted tar archives, especially those using GNU pax sparse format. 3) Employ resource monitoring and memory usage limits on processes handling tar archives to detect and prevent excessive memory consumption. 4) Use sandboxing or containerization to isolate archive processing components, minimizing impact on the host system. 5) Where feasible, avoid automatic processing of tar archives from untrusted sources or require manual verification before extraction. 6) Incorporate rate limiting and scanning of compressed inputs to detect unusually small compressed files that decompress to large sizes. 7) Monitor logs and alerts for abnormal memory usage patterns during archive extraction. These steps go beyond generic advice by focusing on controlling resource consumption, isolating vulnerable components, and enforcing strict input handling policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2025-08-27T14:50:58.691Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69029404f29b216d6d5e20b1

Added to database: 10/29/2025, 10:24:04 PM

Last enriched: 11/5/2025, 11:21:52 PM

Last updated: 12/14/2025, 8:37:04 AM

Views: 136

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats