CVE-2022-48303

GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 7%
VendorProductVersion
gnutar
𝑥
≤ 1.34
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tar
bullseye
1.34+dfsg-1+deb11u1
fixed
bookworm
1.34+dfsg-1.2+deb12u1
fixed
sid
1.35+dfsg-3
fixed
trixie
1.35+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tar
lunar
Fixed 1.34+dfsg-1.2ubuntu0.1
released
kinetic
Fixed 1.34+dfsg-1ubuntu0.1.22.10.1
released
jammy
Fixed 1.34+dfsg-1ubuntu0.1.22.04.1
released
focal
Fixed 1.30+dfsg-7ubuntu0.20.04.3
released
bionic
Fixed 1.29b-2ubuntu0.4
released
xenial
Fixed 1.28-2.1ubuntu0.2+esm2
released
trusty
Fixed 1.27.1-1ubuntu0.1+esm3
released