-
Notifications
You must be signed in to change notification settings - Fork 1.1k
[release-1.33] OCPBUGS-63765: Fix CVE-2025-58183: Update tar-split to v0.12.2 #9591
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: release-1.33
Are you sure you want to change the base?
[release-1.33] OCPBUGS-63765: Fix CVE-2025-58183: Update tar-split to v0.12.2 #9591
Conversation
|
@saschagrunert: No Jira issue with key CVE-2025 exists in the tracker at https://issues.redhat.com/. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: saschagrunert The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
a50019c to
feec271
Compare
|
@saschagrunert: This pull request references Jira Issue OCPBUGS-63773, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@saschagrunert: This pull request references Jira Issue OCPBUGS-63772, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@saschagrunert: This pull request references Jira Issue OCPBUGS-63765, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/jira refresh |
|
@saschagrunert: This pull request references Jira Issue OCPBUGS-63765, which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/jira refresh |
|
@saschagrunert: This pull request references Jira Issue OCPBUGS-63765, which is valid. The bug has been moved to the POST state. 5 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@openshift-ci-robot: GitHub didn't allow me to request PR reviews from the following users: lyman9966. Note that only cri-o members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/jira refresh |
|
@saschagrunert: This pull request references Jira Issue OCPBUGS-63765, which is valid. 5 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@openshift-ci-robot: GitHub didn't allow me to request PR reviews from the following users: lyman9966. Note that only cri-o members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## release-1.33 #9591 +/- ##
================================================
- Coverage 49.54% 49.54% -0.01%
================================================
Files 164 164
Lines 18319 18319
================================================
- Hits 9077 9076 -1
- Misses 8104 8105 +1
Partials 1138 1138 🚀 New features to boost your workflow:
|
CVE-2025-58183 is an unbounded allocation vulnerability in archive/tar when parsing GNU sparse map files. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. This update brings tar-split to v0.12.2 which includes the fix that caps sparse block data to 1 MiB (same limit as PAX headers). Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=2407258 CVE: CVE-2025-58183 Signed-off-by: Sascha Grunert <[email protected]>
feec271 to
cafdbbe
Compare
|
@saschagrunert: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
What type of PR is this?
/kind bug
What this PR does / why we need it:
Fixes CVE-2025-58183 by updating tar-split to v0.12.2.
CVE-2025-58183 is an unbounded allocation vulnerability in archive/tar when parsing GNU sparse map files. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory.
tar-split v0.12.2 includes the fix that caps sparse block data to 1 MiB (same limit as PAX headers).
OpenShift Version: 4.20
Which issue(s) this PR fixes:
Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=2407258
Fixes: https://issues.redhat.com/browse/OCPBUGS-63765
Special notes for your reviewer:
This PR updates:
go.modwith tar-split v0.12.2go.sumvendor/)The vulnerability affects CRI-O's container image layer extraction code path through containers/storage which uses tar-split (a vendored fork of Go's archive/tar).
Does this PR introduce a user-facing change?