{"id":"CVE-2022-37705","details":"A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),","modified":"2026-04-10T04:50:18.915740Z","published":"2023-04-16T01:15:06.867Z","related":["openSUSE-SU-2023:0069-1","openSUSE-SU-2024:12706-1"],"references":[{"type":"WEB","url":"https://marc.info/?l=amanda-hackers"},{"type":"WEB","url":"http://www.amanda.org/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5DCLSX5YYTWMKSMDL67M5STZ5ZDSOXK/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00023.html"},{"type":"WEB","url":"https://github.com/zmanda/amanda/releases/tag/tag-community-3.5.3"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00003.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ATMGMVS3QDN6OMKMHGUTUTU7NS7HR3BZ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYREA6LFXF5M7K4WLNJV5VNQPS4MTBW2/"},{"type":"REPORT","url":"https://github.com/zmanda/amanda/issues/192"},{"type":"FIX","url":"https://github.com/zmanda/amanda/pull/196"},{"type":"FIX","url":"https://github.com/zmanda/amanda/pull/194"},{"type":"FIX","url":"https://github.com/zmanda/amanda/pull/204"},{"type":"EVIDENCE","url":"https://github.com/MaherAzzouzi/CVE-2022-37705"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zmanda/amanda","events":[{"introduced":"0"},{"last_affected":"aed518ee41a70042837fbc15579797526febc805"},{"fixed":"60032f14aeefe63d2b92e01496667315430c5923"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.5.1"}]}}],"versions":["subtag-2.6.0.beta1","subtag-2.6.0.beta2","subtag-3.5","subtag-3.5.1","subtag-community-3.5","subtag-community-3.5.1","tag-2.5.2","tag-2.5.2.beta1","tag-2.5.x-perl","tag-2.6.0","tag-2.6.0.beta2","tag-2.6.1","tag-3.1.x","tag-3.2.0.beta1","tag-3.2.x","tag-3.3.x","tag-3.4.x","tag-3.5-github-master","tag-3.5.1.internal","tag-3.5.rel","tag-community-3.5","tag-community-3.5.1","tag-community-3.5.2","tag-core-3.6.rel"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-37705.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}