{"id":"USN-5966-3","summary":"amanda regression","details":"USN-5966-1 fixed vulnerabilities in amanda. Unfortunately that update\ncaused a regression and was reverted in USN-5966-2. This update provides\nsecurity fixes for Ubuntu 22.10, Ubuntu 22.04 LTS, Ubuntu 20.04\nLTS and Ubuntu 18.04 LTS.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nMaher Azzouzi discovered an information disclosure vulnerability in the\ncalcsize binary within amanda. calcsize is a suid binary owned by root that\ncould possibly be used by a malicious local attacker to expose sensitive\nfile system information. (CVE-2022-37703)\n\nMaher Azzouzi discovered a privilege escalation vulnerability in the\nrundump binary within amanda. rundump is a suid binary owned by root that\ndid not perform adequate sanitization of environment variables or\ncommandline options and could possibly be used by a malicious local\nattacker to escalate privileges. (CVE-2022-37704)\n\nMaher Azzouzi discovered a privilege escalation vulnerability in the runtar\nbinary within amanda. runtar is a suid binary owned by root that did not\nperform adequate sanitization of commandline options and could possibly be\nused by a malicious local attacker to escalate privileges. (CVE-2022-37705)\n \n","modified":"2026-02-10T04:43:01Z","published":"2023-04-03T02:46:52Z","related":["UBUNTU-CVE-2022-37703","UBUNTU-CVE-2022-37704","UBUNTU-CVE-2022-37705"],"upstream":["CVE-2022-37703","CVE-2022-37704","CVE-2022-37705","UBUNTU-CVE-2022-37703","UBUNTU-CVE-2022-37704","UBUNTU-CVE-2022-37705"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5966-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-37703"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-37704"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-37705"},{"type":"REPORT","url":"https://launchpad.net/bugs/2012536"}],"affected":[{"package":{"name":"amanda","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/amanda@1:3.5.1-1ubuntu0.3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.5.1-1ubuntu0.3"}]}],"versions":["1:3.3.9-5build1","1:3.5-2","1:3.5.1-1","1:3.5.1-1build1","1:3.5.1-1build2","1:3.5.1-1ubuntu0.1","1:3.5.1-1ubuntu0.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:3.5.1-1ubuntu0.3","binary_name":"amanda-client"},{"binary_version":"1:3.5.1-1ubuntu0.3","binary_name":"amanda-common"},{"binary_version":"1:3.5.1-1ubuntu0.3","binary_name":"amanda-server"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5966-3.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"id":"CVE-2022-37703","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-37704","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-37705","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}]}}},{"package":{"name":"amanda","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/amanda@1:3.5.1-2ubuntu0.3?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.5.1-2ubuntu0.3"}]}],"versions":["1:3.5.1-2build2","1:3.5.1-2build3","1:3.5.1-2ubuntu0.1","1:3.5.1-2ubuntu0.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:3.5.1-2ubuntu0.3","binary_name":"amanda-client"},{"binary_version":"1:3.5.1-2ubuntu0.3","binary_name":"amanda-common"},{"binary_version":"1:3.5.1-2ubuntu0.3","binary_name":"amanda-server"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5966-3.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2022-37703","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-37704","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-37705","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}]}}},{"package":{"name":"amanda","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/amanda@1:3.5.1-8ubuntu1.3?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.5.1-8ubuntu1.3"}]}],"versions":["1:3.5.1-5ubuntu1","1:3.5.1-8","1:3.5.1-8ubuntu1","1:3.5.1-8ubuntu1.1","1:3.5.1-8ubuntu1.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:3.5.1-8ubuntu1.3","binary_name":"amanda-client"},{"binary_version":"1:3.5.1-8ubuntu1.3","binary_name":"amanda-common"},{"binary_version":"1:3.5.1-8ubuntu1.3","binary_name":"amanda-server"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5966-3.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-37703","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-37704","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-37705","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}]}}}],"schema_version":"1.7.3"}