On 1/19/26 1:21 AM, Robert Howard wrote:
On 1/18/26 9:32 AM, G.W. Haywood wrote:
Hi there,

On Sat, 17 Jan 2026, jbk wrote:

... thoughts / questions on the zlib CVE.

Can we be specific about which CVE?

There are two path's of vulnerability for the BackupPC server.  One is the distro installed zlib and the other is the zlib bundled in
BackupPC to date.

Assuming that you're restricting your consideration of vulnerabilities to those in zlib and the zlib bundled by BackupPC, then yes. Although the subject is "BackupPC-XS ...", to date not only BackupPC-XS but the original rsync and rsync-bpc *also* bundle zlib.  So, I gather, do a number of other packages.  As far as rsync-bpc is concerned I'm in the
midst of dealing with it - see below.

The distro installed zlib supposedly will be patched soon, not as of yet.  Anyone who has access to this server could avail themselves of
the vulnerability till it is patched.

Are all the big distros not all up to speed with zlib patches? That may beg the questions (a) which distro? and (b) to whom do you permit
what kinds of access to your backup server?

Once it is patched then the only users who have access to the bundled zlib are those trusted BackupPC admin users.  The client users shouldn't have direct access to the bundled zlib, correct?

I'm not sure that I follow.

To make use of flaws in the bundled zlib library, direct access to the bundled library is not a requirement.  If (and *only* if) (1) BackupPC is linked with the vulnerable library and (2) there's some way for an attacker to get a vulnerable function called, all the attacker must do is somehow arrange for BackupPC to pipe through zlib data which our attacker has somehow contrived to cause BackupPC to make a call to the vulnerable function (and for this call to do something of use to the
attacker, but that's his problem).

In the case of BackupPC I'm not sure how easy it would be to arrange for these conditions to be met, but it could theoretically be achieved by getting BackupPC to back up or recover a crafted file.  (If users can e.g. run a compiler on the server they can alternatively download vulnerable code (any vulnerable code, not just zlib) and build it. Then they can do what they like with it.  I've done that for example to hack into a Debian box when the owner forgot the root password.

Just trying to get an idea of the risk level for the bundled zlib.

In my view, if you're running a vulnerable zlib it's low if you're (otherwise) sane - but since compiling the bundled zlib in the first
place is optional, avoiding the risk seems trivial.

FWIW I think I'm very close to releasing rsync-bpc version 3.4.1.0rc1, which is hopefully going to put this one to bed at last for BackupPC. The new version will use both the system zlib and the system popt and
will bundle neither.

The CVE is https://www.cve.org/CVERecord?id=CVE-2026-22184 and marked disputed. See also

https://www.openwall.com/lists/oss-security/2026/01/06/5

This was patched very quickly by some distributions even though the problem is not in zlib.  This is a bug in a *contibuted reference program* demonstrating how to use zlib. This is not a problem in zlib itself.

See the thread at https://github.com/madler/zlib/issues/1142


Ged,

I didn't really know how to craft a concise question but your response put things in context for me. The CVE I was refering to was linked in R. Shaw's email that you responded to up thread, but that linked to RHEL's global response to all it's zlib related package maintainers which quoted a portion of the original CVE on zlib.
Per R. Howard's post here it appears not to be an issue at all.
I did try to hunt for that function call in the bundled zlib source and I couldn't find it and now I know why.

--
Jim KR

_______________________________________________
BackupPC-users mailing list
[email protected]
List:    https://lists.sourceforge.net/lists/listinfo/backuppc-users
Wiki:    https://github.com/backuppc/backuppc/wiki
Project: https://backuppc.github.io/backuppc/

Reply via email to