Bug 2432830 - CVE-2025-11002 advancecomp: 7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability [epel-8]
Summary: CVE-2025-11002 advancecomp: 7-Zip ZIP File Parsing Directory Traversal Remote...
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: advancecomp
Version: epel8
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Ben Beasley
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: {"flaws": ["f90450ee-5b2d-4cfd-a654-8...
Depends On:
Blocks: CVE-2025-11002
TreeView+ depends on / blocked
 
Reported: 2026-01-26 14:43 UTC by Guilherme de Almeida Suckevicz
Modified: 2026-01-26 14:51 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2026-01-26 14:51:59 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2026-01-26 14:43:10 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Ben Beasley 2026-01-26 14:51:59 UTC
The advancecomp package does include code forked from a subset of a very old version of 7-Zip, so it is possible that it could be impacted by a vulnerability in 7-Zip. However, neither the CVE report https://www.cve.org/CVERecord?id=CVE-2025-11002 nor the Zero Day Initiative report https://www.zerodayinitiative.com/advisories/ZDI-25-950/ provides any details about the precise nature of the bug, the source files or functions where the bug exists, or the nature of the fix that was included in 7-Zip 25.00. Furthermore, while 7-Zip is open-source, it is not developed “in the open,” in that it has no public VCS, so we can’t dig through the commit history to try to figure out which change was associated with this report. All this means that there is not remotely enough information available to determine whether or not advancecomp is affected by this CVE, let alone to fix it, if it turns out that there is something to fix. It seems unlikely that more information will ever become available, so I’m closing this bug.


Note You need to log in before you can comment on or make changes to this bug.