fix: patch CVE-2025-58183 in golang stdlib #1968
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
Fix CVE-2025-58183: Unbounded allocation when parsing GNU sparse map in Go's archive/tar package
CVE Details
How the CVE Was Introduced
The vulnerable
[email protected]was introduced through the Go version specified inpulsarctl/go.mod:go 1.25.0specified the minimum Go version requiredmake pulsarctl, it uses the system's Go compiler/pulsar/bin/pulsarctlThe pulsarctl binary is a Go-based CLI tool built with Go 1.25.0, which includes the vulnerable stdlib. The vulnerability exists in the
archive/tarpackage which handles tar archive parsing.Why This Fix Resolves the CVE
Upgrading from Go 1.25.0 to Go 1.25.2 patches the CVE by:
This is a pure dependency version update - no pulsarctl code changes are needed. The fix is inherited from the upstream Go release.
Changes Made
go.modline 3 fromgo 1.25.0togo 1.25.2Verification
After this PR is merged:
References
Related Previous CVE Fixes (For Reference)
These previous fixes followed the same pattern: update the Go version in pulsarctl's go.mod to patch stdlib vulnerabilities.