vulnerability
Amazon Linux 2023: CVE-2025-58183: Important priority package update for golang (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Oct 29, 2025 | Oct 31, 2025 | Dec 4, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Oct 29, 2025
Added
Oct 31, 2025
Modified
Dec 4, 2025
Description
tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.
A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.
A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.
Solutions
amazon-linux-2023-upgrade-amazon-cloudwatch-agentamazon-linux-2023-upgrade-captreeamazon-linux-2023-upgrade-captree-debuginfoamazon-linux-2023-upgrade-containerdamazon-linux-2023-upgrade-containerd-debuginfoamazon-linux-2023-upgrade-containerd-debugsourceamazon-linux-2023-upgrade-containerd-stressamazon-linux-2023-upgrade-containerd-stress-debuginfoamazon-linux-2023-upgrade-dockeramazon-linux-2023-upgrade-docker-debuginfoamazon-linux-2023-upgrade-docker-debugsourceamazon-linux-2023-upgrade-golangamazon-linux-2023-upgrade-golang-binamazon-linux-2023-upgrade-golang-docsamazon-linux-2023-upgrade-golang-miscamazon-linux-2023-upgrade-golang-sharedamazon-linux-2023-upgrade-golang-srcamazon-linux-2023-upgrade-golang-testsamazon-linux-2023-upgrade-golistamazon-linux-2023-upgrade-golist-debuginfoamazon-linux-2023-upgrade-golist-debugsourceamazon-linux-2023-upgrade-libcapamazon-linux-2023-upgrade-libcap-debuginfoamazon-linux-2023-upgrade-libcap-debugsourceamazon-linux-2023-upgrade-libcap-develamazon-linux-2023-upgrade-libcap-staticamazon-linux-2023-upgrade-nerdctlamazon-linux-2023-upgrade-oci-add-hooksamazon-linux-2023-upgrade-oci-add-hooks-debuginfoamazon-linux-2023-upgrade-oci-add-hooks-debugsourceamazon-linux-2023-upgrade-runcamazon-linux-2023-upgrade-runc-debuginfoamazon-linux-2023-upgrade-runc-debugsourceamazon-linux-2023-upgrade-soci-snapshotter
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.