Bug 2418244 - CVE-2025-11001 advancecomp: 7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability [fedora-42]
Summary: CVE-2025-11001 advancecomp: 7-Zip ZIP File Parsing Directory Traversal Remote...
Keywords:
Status: CLOSED CANTFIX
Alias: None
Product: Fedora
Classification: Fedora
Component: advancecomp
Version: 42
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Ben Beasley
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: {"flaws": ["4014d130-3f69-47f6-99c9-5...
Depends On:
Blocks: CVE-2025-11001
TreeView+ depends on / blocked
 
Reported: 2025-12-02 05:17 UTC by Avinash Hanwate
Modified: 2025-12-02 11:01 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2025-12-02 11:01:49 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2025-12-02 05:17:29 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

The following link provides references to all essential vulnerability management information. If something is wrong or missing, please contact a member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essential+Documents+for+Engineering+Teams

Comment 1 Ben Beasley 2025-12-02 11:01:49 UTC
There is very little detail about this in https://www.cve.org/CVERecord?id=CVE-2025-11001 and https://www.zerodayinitiative.com/advisories/ZDI-25-949/. The vulnerability was reportedly fixed in 7-Zip 25.00, but 7-Zip upstream does not develop “in the open” and lacks a public VCS, so it’s effectively impossible to determine the location of the code responsible for the advisory, whether the affected code is included in the (forked, very old) 7-Zip code included in advancecomp, or the nature of the fix. There is therefore far too little available information to determine if this advisory applies or not, let alone patch it, and no reasonable prospect of that situation changing.


Note You need to log in before you can comment on or make changes to this bug.