First published: Tue Jan 30 2024(Updated: )
It was discovered that amanda did not properly check certain arguments. A local unprivileged attacker could possibly use this issue to perform a privilege escalation attack.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/amanda-client | <1:3.5.1-11ubuntu0.23.10.1 | 1:3.5.1-11ubuntu0.23.10.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/amanda-client | <1:3.5.1-8ubuntu1.4 | 1:3.5.1-8ubuntu1.4 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/amanda-client | <1:3.5.1-2ubuntu0.4 | 1:3.5.1-2ubuntu0.4 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/amanda-client | <1:3.5.1-1ubuntu0.3+esm1 | 1:3.5.1-1ubuntu0.3+esm1 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6614-1 is classified as a privilege escalation vulnerability.
To fix USN-6614-1, update the amanda-client package to a vulnerable-free version specified in the advisory.
USN-6614-1 affects versions of amanda-client prior to 1:3.5.1-11ubuntu0.23.10.1 for Ubuntu 23.10, 1:3.5.1-8ubuntu1.4 for Ubuntu 22.04, 1:3.5.1-2ubuntu0.4 for Ubuntu 20.04, and 1:3.5.1-1ubuntu0.3+esm1 for Ubuntu 18.04.
The vulnerability identified in USN-6614-1 can be exploited by a local unprivileged attacker.
The affected product in USN-6614-1 is the amanda-client package on supported versions of Ubuntu.