Description
tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the "old GNU sparse map" format.
Published: 2026-04-08
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unbounded memory allocation when parsing tar archives using the old GNU sparse map format.
Action: Update
AI Analysis

Impact

A tar.Reader in the Go standard library can allocate an unlimited amount of memory when parsing a malicious archive that contains a large number of sparse regions encoded in the old GNU sparse map format. The resulting out‑of‑memory condition can cause the process to crash or be terminated, leading to a denial‑of‑service impact. The weakness corresponds to CWE-770, indicating an unbounded allocation of resources.

Affected Systems

The vulnerability affects the Go standard library package archive/tar. No specific version ranges are provided in the source data, so any application that imports archive/tar and processes user supplied tar files is potentially exposed. If a system relies on an older Go release that has not yet been patched, it remains vulnerable.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate severity. The EPSS score of less than 1% suggests that the probability of exploitation in the wild is low, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector involves an adversary supplying a specially crafted tar archive to an application that uses the affected tar.Reader implementation. Exploitation requires the target to accept and process the archive; if the archive is refused or the application terminates before allocation, the impact is mitigated. In environments where arbitrary tar inputs are processed, the risk is higher because the resource exhaustion can disrupt service availability.

Generated by OpenCVE AI on April 13, 2026 at 21:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Go runtime to a version that includes the latest fix for the unbounded allocation issue in archive/tar.

Generated by OpenCVE AI on April 13, 2026 at 21:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Golang
Golang go
CPEs cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
Vendors & Products Golang
Golang go

Mon, 13 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Go Standard Library
Go Standard Library archive/tar
Weaknesses CWE-789
Vendors & Products Go Standard Library
Go Standard Library archive/tar

Thu, 09 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}

threat_severity

Moderate


Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-789

Wed, 08 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
Description tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the "old GNU sparse map" format.
Title Unbounded allocation for old GNU sparse in archive/tar
References

Subscriptions

Go Standard Library Archive/tar
Golang Go
cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-04-13T18:20:08.191Z

Reserved: 2026-03-11T16:38:46.557Z

Link: CVE-2026-32288

cve-icon Vulnrichment

Updated: 2026-04-13T17:51:02.647Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T02:16:03.707

Modified: 2026-04-16T19:08:52.240

Link: CVE-2026-32288

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-08T01:06:57Z

Links: CVE-2026-32288 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:40:16Z

Weaknesses