A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),
www.amanda.org/
github.com/MaherAzzouzi/CVE-2022-37705
github.com/zmanda/amanda/issues/192
github.com/zmanda/amanda/pull/194
github.com/zmanda/amanda/pull/196
github.com/zmanda/amanda/pull/204
github.com/zmanda/amanda/releases/tag/tag-community-3.5.3
lists.debian.org/debian-lts-announce/2023/12/msg00003.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5DCLSX5YYTWMKSMDL67M5STZ5ZDSOXK/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ATMGMVS3QDN6OMKMHGUTUTU7NS7HR3BZ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYREA6LFXF5M7K4WLNJV5VNQPS4MTBW2/
marc.info/?l=amanda-hackers