GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.
                
            References
                    | Link | Resource | 
|---|---|
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/ | Mailing List Third Party Advisory | 
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/ | Mailing List Third Party Advisory | 
| https://savannah.gnu.org/bugs/?62387 | Exploit Vendor Advisory | 
| https://savannah.gnu.org/patch/?10307 | Patch Vendor Advisory | 
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/ | Mailing List Third Party Advisory | 
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/ | Mailing List Third Party Advisory | 
| https://savannah.gnu.org/bugs/?62387 | Exploit Vendor Advisory | 
| https://savannah.gnu.org/patch/?10307 | Patch Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:33
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/ - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/ - Mailing List, Third Party Advisory | |
| References | () https://savannah.gnu.org/bugs/?62387 - Exploit, Vendor Advisory | |
| References | () https://savannah.gnu.org/patch/?10307 - Patch, Vendor Advisory | |
| Summary | 
 | 
30 May 2023, 17:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/ - Mailing List, Third Party Advisory | |
| References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/ - Mailing List, Third Party Advisory | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.5 | 
| First Time | Fedoraproject fedora Fedoraproject | |
| CPE | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* | 
27 Mar 2023, 00:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
 | 
26 Mar 2023, 02:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
23 Mar 2023, 03:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
Information
                Published : 2023-01-30 04:15
Updated : 2025-03-27 21:15
NVD link : CVE-2022-48303
Mitre link : CVE-2022-48303
CVE.ORG link : CVE-2022-48303
JSON object : View
Products Affected
                fedoraproject
- fedora
gnu
- tar
CWE
                
                    
                        
                        CWE-125
                        
            Out-of-bounds Read
