{"id":"CVE-2022-48303","details":"GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.","modified":"2026-04-16T04:38:24.056556130Z","published":"2023-01-30T04:15:08.030Z","related":["ALSA-2023:0842","ALSA-2023:0959","SUSE-SU-2023:0441-1","SUSE-SU-2023:0463-1","openSUSE-SU-2024:12744-1"],"references":[{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/"},{"type":"FIX","url":"https://savannah.gnu.org/patch/?10307"},{"type":"EVIDENCE","url":"https://savannah.gnu.org/bugs/?62387"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48303.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.34"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}