Closed
Conversation
- Update go.mod from go 1.25.0 to go 1.25.2 - Fix CVE-2025-58183: Unbounded allocation when parsing GNU sparse map in archive/tar CVE: https://nvd.nist.gov/vuln/detail/CVE-2025-58183 Severity: HIGH Affected: stdlib@v1.25.0 in pulsarctl binary Fixed Version: 1.25.2 The vulnerability in Go's stdlib archive/tar package allows unbounded memory allocation when parsing GNU tar pax 1.0 sparse files. By upgrading to Go 1.25.2, this vulnerability is resolved. Related: streamnative/eng-support-tickets#3615
|
@shibd:Thanks for your contribution. For this PR, do we need to update docs? |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Fix CVE-2025-58183: Unbounded allocation when parsing GNU sparse map in Go's archive/tar package
CVE Details
How the CVE Was Introduced
The vulnerable
stdlib@v1.25.0was introduced through the Go version specified inpulsarctl/go.mod:go 1.25.0specified the minimum Go version requiredmake pulsarctl, it uses the system's Go compiler/pulsar/bin/pulsarctlThe pulsarctl binary is a Go-based CLI tool built with Go 1.25.0, which includes the vulnerable stdlib. The vulnerability exists in the
archive/tarpackage which handles tar archive parsing.Why This Fix Resolves the CVE
Upgrading from Go 1.25.0 to Go 1.25.2 patches the CVE by:
This is a pure dependency version update - no pulsarctl code changes are needed. The fix is inherited from the upstream Go release.
Changes Made
go.modline 3 fromgo 1.25.0togo 1.25.2Verification
After this PR is merged:
References
Related Previous CVE Fixes (For Reference)
These previous fixes followed the same pattern: update the Go version in pulsarctl's go.mod to patch stdlib vulnerabilities.