Amanda 3.5.1 allows privilege escalation from the regular user backup to root. The SUID binary located at /lib/amanda/rundump will execute /usr/sbin/dump as root with controlled arguments from the attacker which may lead to escalation of privileges, denial of service, and information disclosure.
www.amanda.org/
github.com/MaherAzzouzi/CVE-2022-37704
github.com/zmanda/amanda/issues/192
github.com/zmanda/amanda/pull/197
github.com/zmanda/amanda/pull/205
github.com/zmanda/amanda/releases/tag/tag-community-3.5.3
lists.debian.org/debian-lts-announce/2023/02/msg00025.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5DCLSX5YYTWMKSMDL67M5STZ5ZDSOXK/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ATMGMVS3QDN6OMKMHGUTUTU7NS7HR3BZ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYREA6LFXF5M7K4WLNJV5VNQPS4MTBW2/
marc.info/?l=amanda-hackers