]> Cypherpunks repositories - gostls13.git/commit
archive/tar: set a limit on the size of GNU sparse file 1.0 regions
authorDamien Neil <dneil@google.com>
Thu, 11 Sep 2025 20:32:10 +0000 (13:32 -0700)
committerGopher Robot <gobot@golang.org>
Tue, 7 Oct 2025 19:46:36 +0000 (12:46 -0700)
commitf7a68d3804efabd271f0338391858bc1e7e57422
tree1fcff6a9eead1da11d61db9fa79693df5f76eaea
parent463165699d874ef0ac7965fc5788fe1693eaae9a
archive/tar: set a limit on the size of GNU sparse file 1.0 regions

Sparse files in tar archives contain only the non-zero components
of the file. There are several different encodings for sparse
files. When reading GNU tar pax 1.0 sparse files, archive/tar did
not set a limit on the size of the sparse region data. A malicious
archive containing a large number of sparse blocks could cause
archive/tar to read an unbounded amount of data from the archive
into memory.

Since a malicious input can be highly compressable, a small
compressed input could cause very large allocations.

Cap the size of the sparse block data to the same limit used
for PAX headers (1 MiB).

Thanks to Harshit Gupta (Mr HAX) (https://www.linkedin.com/in/iam-harshit-gupta/)
for reporting this issue.

Fixes CVE-2025-58183
Fixes #75677

Change-Id: I70b907b584a7b8676df8a149a1db728ae681a770
Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/2800
Reviewed-by: Roland Shoemaker <bracewell@google.com>
Reviewed-by: Nicholas Husin <husin@google.com>
Reviewed-on: https://go-review.googlesource.com/c/go/+/709861
Auto-Submit: Michael Pratt <mpratt@google.com>
TryBot-Bypass: Michael Pratt <mpratt@google.com>
Reviewed-by: Carlos Amedee <carlos@golang.org>
src/archive/tar/common.go
src/archive/tar/reader.go
src/archive/tar/reader_test.go
src/archive/tar/testdata/gnu-sparse-many-zeros.tar.bz2 [new file with mode: 0644]