Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/p7zip@16.02%2Btransitional.1?distro=trixie
purl pkg:deb/debian/p7zip@16.02%2Btransitional.1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (20)
Vulnerability Summary Aliases
VCID-6qgu-7h5h-1bed 7-Zip is a file archiver with a high compression ratio. 7-Zip supports extracting from Compound Documents. Prior to version 25.0.0, a null pointer dereference in the Compound handler may lead to denial of service. Version 25.0.0 contains a fix cor the issue. CVE-2025-53817
VCID-6xnz-5ctc-fkbk 7-Zip SquashFS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SQFS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18589. CVE-2023-40481
VCID-8q1b-v4dz-ukd7 Multiple vulnerabilities have been found in 7-Zip, the worst of which may allow execution of arbitrary code. CVE-2016-2334
VCID-bzcx-rxg3-aygs 7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the implementation of Zstandard decompression. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24346. CVE-2024-11477
VCID-f41j-n5ph-gkb9 Unspecified vulnerability in 7-zip before 4.5.7 has unknown impact and remote attack vectors, as demonstrated by the PROTOS GENOME test suite for Archive Formats (c10). CVE-2008-6536
VCID-h4pw-pga4-77ex 7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456. CVE-2025-0411
VCID-hgkj-wq8u-q3eh The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains a heap-based buffer overflow that allows an attacker to overwrite two bytes at multiple offsets beyond the allocated buffer size: buffer+512*i-2, for i=9, i=10, i=11, etc. CVE-2023-52168
VCID-j4uh-y3j4-5kdw A null pointer dereference bug affects the 16.02 and many old versions of p7zip. A lack of null pointer check for the variable folders.PackPositions in function CInArchive::ReadAndDecodePackedStreams in CPP/7zip/Archive/7z/7zIn.cpp, as used in the 7z.so library and in 7z applications, will cause a crash and a denial of service when decoding malformed 7z files. CVE-2016-9296
VCID-j6h3-hn7t-4ugj security update CVE-2017-17969
VCID-mjeh-zkd6-1kaj p7zip 16.02 was discovered to contain a heap-buffer-overflow vulnerability via the function NArchive::NZip::CInArchive::FindCd(bool) at CPP/7zip/Archive/Zip/ZipIn.cpp. NOTE: the Supplier has found that this is not a buffer overflow; at most an out-of-bounds read can occur. CVE-2022-47069
VCID-ne48-dtxr-2ybq 7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of symbolic links in ZIP files. Crafted data in a ZIP file can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of a service account. Was ZDI-CAN-26743. CVE-2025-11002
VCID-pgke-8ce4-uybu 7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of symbolic links in ZIP files. Crafted data in a ZIP file can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of a service account. Was ZDI-CAN-26753. CVE-2025-11001
VCID-pj98-u4mm-r7cw 7-Zip 22.01 does not report an error for certain invalid xz files, involving block flags and reserved bits. Some later versions are unaffected. CVE-2022-47111
VCID-q99c-7ggg-wyep Ppmd7.c in 7-Zip before 23.00 allows an integer underflow and invalid read operation via a crafted 7Z archive. CVE-2023-31102
VCID-rnzv-mnjr-rfby 7-Zip CopyCoder Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of streams. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-24307. CVE-2024-11612
VCID-uebs-8u4d-3bd1 The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains an out-of-bounds read that allows an attacker to read beyond the intended buffer. The bytes read beyond the intended buffer are presented as a part of a filename listed in the file system image. This has security relevance in some known web-service use cases where untrusted users can upload files and have them extracted by a server-side 7-Zip process. CVE-2023-52169
VCID-xnza-jsw8-pbcy security update CVE-2015-1038
VCID-xrbx-dps5-ekfe 7-Zip 22.01 does not report an error for certain invalid xz files, involving stream flags and reserved bits. Some later versions are unaffected. CVE-2022-47112
VCID-ymuu-t8yt-4kbk 7-Zip before 25.01 does not always properly handle symbolic links during extraction. CVE-2025-55188
VCID-yx2s-gkz7-nyb2 Multiple vulnerabilities have been found in 7-Zip, the worst of which may allow execution of arbitrary code. CVE-2016-2335

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:20:26.574491+00:00 Debian Importer Fixing VCID-yx2s-gkz7-nyb2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:16:09.548702+00:00 Debian Importer Fixing VCID-j4uh-y3j4-5kdw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:35:21.934650+00:00 Debian Importer Fixing VCID-f41j-n5ph-gkb9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:32:17.112857+00:00 Debian Importer Fixing VCID-h4pw-pga4-77ex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:05:13.205542+00:00 Debian Importer Fixing VCID-bzcx-rxg3-aygs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:31:36.228944+00:00 Debian Importer Fixing VCID-8q1b-v4dz-ukd7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:35.714989+00:00 Debian Importer Fixing VCID-j6h3-hn7t-4ugj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:00.526009+00:00 Debian Importer Fixing VCID-xnza-jsw8-pbcy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:26:33.253587+00:00 Debian Importer Fixing VCID-yx2s-gkz7-nyb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:23:27.530661+00:00 Debian Importer Fixing VCID-j4uh-y3j4-5kdw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:05.832770+00:00 Debian Importer Fixing VCID-f41j-n5ph-gkb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:53.218613+00:00 Debian Importer Fixing VCID-h4pw-pga4-77ex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:31:44.688287+00:00 Debian Importer Fixing VCID-bzcx-rxg3-aygs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:19.714879+00:00 Debian Importer Fixing VCID-8q1b-v4dz-ukd7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:16.142949+00:00 Debian Importer Fixing VCID-j6h3-hn7t-4ugj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:11.612977+00:00 Debian Importer Fixing VCID-xnza-jsw8-pbcy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:49:17.135398+00:00 Debian Importer Fixing VCID-ymuu-t8yt-4kbk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:17.117750+00:00 Debian Importer Fixing VCID-6qgu-7h5h-1bed https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:17.099991+00:00 Debian Importer Fixing VCID-ne48-dtxr-2ybq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:17.082275+00:00 Debian Importer Fixing VCID-pgke-8ce4-uybu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:17.064467+00:00 Debian Importer Fixing VCID-h4pw-pga4-77ex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:17.036524+00:00 Debian Importer Fixing VCID-rnzv-mnjr-rfby https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:17.017711+00:00 Debian Importer Fixing VCID-bzcx-rxg3-aygs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.989067+00:00 Debian Importer Fixing VCID-uebs-8u4d-3bd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.971263+00:00 Debian Importer Fixing VCID-hgkj-wq8u-q3eh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.953412+00:00 Debian Importer Fixing VCID-6xnz-5ctc-fkbk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.935501+00:00 Debian Importer Fixing VCID-q99c-7ggg-wyep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.915759+00:00 Debian Importer Fixing VCID-xrbx-dps5-ekfe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.892451+00:00 Debian Importer Fixing VCID-pj98-u4mm-r7cw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.874620+00:00 Debian Importer Fixing VCID-mjeh-zkd6-1kaj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.856459+00:00 Debian Importer Fixing VCID-j6h3-hn7t-4ugj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.822550+00:00 Debian Importer Fixing VCID-j4uh-y3j4-5kdw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.788610+00:00 Debian Importer Fixing VCID-yx2s-gkz7-nyb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.756650+00:00 Debian Importer Fixing VCID-8q1b-v4dz-ukd7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.722153+00:00 Debian Importer Fixing VCID-xnza-jsw8-pbcy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:16.688571+00:00 Debian Importer Fixing VCID-f41j-n5ph-gkb9 https://security-tracker.debian.org/tracker/data/json 38.1.0