Debian Package Tracker
Register | Log in
Subscribe

amanda

Choose email to subscribe with

general
  • source: amanda (main)
  • version: 1:3.5.1-11
  • maintainer: Jose M Calhariz (DMD)
  • arch: any
  • std-ver: 4.0.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 1:3.5.1-2
  • old-sec: 1:3.5.1-2+deb10u1
  • stable: 1:3.5.1-7
  • testing: 1:3.5.1-11
  • unstable: 1:3.5.1-11
versioned links
  • 1:3.5.1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:3.5.1-2+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:3.5.1-7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:3.5.1-11: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • amanda-client (17 bugs: 0, 7, 10, 0)
  • amanda-common (4 bugs: 0, 4, 0, 0)
  • amanda-server (17 bugs: 0, 11, 6, 0)
action needed
debian/patches: 1 patch with invalid metadata, 29 patches to forward upstream high

Among the 30 debian patches available in version 1:3.5.1-11 of the package, we noticed the following issues:

  • 1 patch with invalid metadata that ought to be fixed.
  • 29 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-03-22 07:36
lintian reports 1 error and 69 warnings high
Lintian reports 1 error and 69 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-01-01 Last update: 2023-02-18 08:01
2 bugs tagged patch in the BTS normal
The BTS contains patches fixing 2 bugs, consider including or untagging them.
Created: 2022-07-27 Last update: 2023-05-17 12:30
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2022-10-22 Last update: 2023-05-17 08:00
6 new commits since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit c56d4af6f576ce0426c469192ce7adb420e5ac24
Author: Jose M Calhariz <calhariz@debian.org>
Date:   Tue Mar 21 17:37:26 2023 +0000

    Preparing to upload to sid.

commit 3c663c9e9d6f5dc5771b02114e231849eebe4943
Author: Jose M Calhariz <calhariz@debian.org>
Date:   Sun Mar 5 00:32:31 2023 +0000

    WIP CVE-2022-37705 part 2

commit ae16fd35d13e04cfbbc88c515ea196f78f4fc1dc
Author: Jose M Calhariz <calhariz@debian.org>
Date:   Sun Mar 5 00:29:55 2023 +0000

    Fix the patch, was wrongly applied.

commit c47e0e359ee284d477af5812e7c05b530c515827
Author: Jose M Calhariz <calhariz@debian.org>
Date:   Sat Mar 4 23:55:14 2023 +0000

    Preparing to release to sid.

commit 61032029bd7283c7b9d2a32f0b418e35a562ddbc
Author: Jose M Calhariz <calhariz@debian.org>
Date:   Sat Mar 4 22:19:53 2023 +0000

    WIP CVE-2022-37705 part 2

commit 83f1c0d5af0b09461bc7dda182f60eac0bcdb073
Author: Jose M Calhariz <calhariz@debian.org>
Date:   Sat Mar 4 22:14:22 2023 +0000

    Fix CVE-2022-37705 part 2
Created: 2023-03-21 Last update: 2023-05-17 03:06
3 low-priority security issues in bullseye low

There are 3 open security issues in bullseye.

3 issues left for the package maintainer to handle:
  • CVE-2022-37703: (needs triaging) In Amanda 3.5.1, an information leak vulnerability was found in the calcsize SUID binary. An attacker can abuse this vulnerability to know if a directory exists or not anywhere in the fs. The binary will use `opendir()` as root directly without checking the path, letting the attacker provide an arbitrary path.
  • CVE-2022-37704: (needs triaging) Amanda 3.5.1 allows privilege escalation from the regular user backup to root. The SUID binary located at /lib/amanda/rundump will execute /usr/sbin/dump as root with controlled arguments from the attacker which may lead to escalation of privileges, denial of service, and information disclosure.
  • CVE-2022-37705: (needs triaging) A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-09-15 Last update: 2023-04-17 07:06
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.0.1).
Created: 2017-10-23 Last update: 2023-03-22 02:31
news
[rss feed]
  • [2023-03-27] amanda 1:3.5.1-11 MIGRATED to testing (Debian testing watch)
  • [2023-03-21] Accepted amanda 1:3.5.1-11 (source) into unstable (Jose M Calhariz)
  • [2023-03-09] amanda 1:3.5.1-10 MIGRATED to testing (Debian testing watch)
  • [2023-03-09] amanda 1:3.5.1-10 MIGRATED to testing (Debian testing watch)
  • [2023-02-26] Accepted amanda 1:3.5.1-10 (source) into unstable (Jose M Calhariz)
  • [2023-02-21] Accepted amanda 1:3.5.1-2+deb10u1 (source amd64) into oldstable (Chris Lamb)
  • [2022-07-18] amanda 1:3.5.1-9 MIGRATED to testing (Debian testing watch)
  • [2022-07-13] Accepted amanda 1:3.5.1-9 (source) into unstable (Jose M Calhariz)
  • [2022-04-26] amanda REMOVED from testing (Debian testing watch)
  • [2021-08-28] amanda 1:3.5.1-8 MIGRATED to testing (Debian testing watch)
  • [2021-08-22] Accepted amanda 1:3.5.1-8 (source) into unstable (Jose M Calhariz)
  • [2021-07-06] amanda 1:3.5.1-7 MIGRATED to testing (Debian testing watch)
  • [2021-06-28] Accepted amanda 1:3.5.1-7 (source) into unstable (Jose M Calhariz)
  • [2021-06-22] Accepted amanda 1:3.5.1-6 (source) into unstable (Jose M Calhariz)
  • [2020-08-09] amanda 1:3.5.1-5 MIGRATED to testing (Debian testing watch)
  • [2020-08-02] Accepted amanda 1:3.5.1-5 (source) into unstable (Jose M Calhariz)
  • [2020-06-08] amanda 1:3.5.1-4 MIGRATED to testing (Debian testing watch)
  • [2020-06-02] Accepted amanda 1:3.5.1-4 (source) into unstable (Jose M Calhariz)
  • [2018-04-27] amanda 1:3.5.1-2 MIGRATED to testing (Debian testing watch)
  • [2018-04-21] Accepted amanda 1:3.5.1-2 (source amd64) into unstable (Jose M Calhariz)
  • [2018-01-13] amanda 1:3.5.1-1 MIGRATED to testing (Debian testing watch)
  • [2018-01-07] Accepted amanda 1:3.5.1-1 (source amd64) into unstable (Jose M Calhariz)
  • [2017-11-20] amanda 1:3.5-2 MIGRATED to testing (Debian testing watch)
  • [2017-11-08] amanda REMOVED from testing (Debian testing watch)
  • [2017-11-05] Accepted amanda 1:3.5-2 (source amd64) into unstable (Jose M Calhariz)
  • [2017-10-22] Accepted amanda 1:3.5-1 (source amd64) into experimental (Jose M Calhariz)
  • [2017-03-06] Accepted amanda 1:3.4.3-1 (source i386) into experimental (Jose M Calhariz)
  • [2017-02-23] Accepted amanda 1:3.4.2-1 (source i386) into experimental (Jose M Calhariz)
  • [2017-02-05] amanda 1:3.3.9-5 MIGRATED to testing (Debian testing watch)
  • [2017-01-25] Accepted amanda 1:3.3.9-5 (source) into unstable (Jose M Calhariz) (signed by: Ondřej Surý)
  • 1
  • 2
bugs [bug history graph]
  • all: 39 41
  • RC: 0
  • I&N: 22 23
  • M&W: 16 17
  • F&P: 1
  • patch: 2
links
  • homepage
  • lintian (1, 69)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (100, -)
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:3.5.1-11
  • 23 bugs (1 patch)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing