Bug 2418240
| Summary: | CVE-2025-11001 advancecomp: 7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability [fedora-43] | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Avinash Hanwate <ahanwate> |
| Component: | advancecomp | Assignee: | Ben Beasley <code> |
| Status: | CLOSED CANTFIX | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 43 | CC: | code, i, tdawson |
| Target Milestone: | --- | Keywords: | Security, SecurityTracking |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | {"flaws": ["4014d130-3f69-47f6-99c9-57d3fb95a2fb"]} | ||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2025-12-02 11:00:58 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2416011 | ||
|
Description
Avinash Hanwate
2025-12-02 05:17:12 UTC
There is very little detail about this in https://www.cve.org/CVERecord?id=CVE-2025-11001 and https://www.zerodayinitiative.com/advisories/ZDI-25-949/. The vulnerability was reportedly fixed in 7-Zip 25.00, but 7-Zip upstream does not develop “in the open” and lacks a public VCS, so it’s effectively impossible to determine the location of the code responsible for the advisory, whether the affected code is included in the (forked, very old) 7-Zip code included in advancecomp, or the nature of the fix. There is therefore far too little available information to determine if this advisory applies or not, let alone patch it, and no reasonable prospect of that situation changing. |