Vulnerability Details CVE-2022-48303
GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 7.9%
CVSS Severity
CVSS v3 Score 5.5
Products affected by CVE-2022-48303
-
-
-
-
-
-
-
cpe:2.3:a:gnu:tar:1.13.11
-
cpe:2.3:a:gnu:tar:1.13.14
-
cpe:2.3:a:gnu:tar:1.13.16
-
cpe:2.3:a:gnu:tar:1.13.17
-
cpe:2.3:a:gnu:tar:1.13.18
-
cpe:2.3:a:gnu:tar:1.13.19
-
cpe:2.3:a:gnu:tar:1.13.25
-
-
-
-
cpe:2.3:a:gnu:tar:1.14.90
-
-
-
cpe:2.3:a:gnu:tar:1.15.90
-
cpe:2.3:a:gnu:tar:1.15.91
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
cpe:2.3:o:fedoraproject:fedora:37
-
cpe:2.3:o:fedoraproject:fedora:38