Debian dla-4576 : p7zip - security update

medium Nessus Plugin ID 314237

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4576 advisory.

- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4576-1 [email protected] https://www.debian.org/lts/security/ Sylvain Beucler May 11, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : p7zip Version : 16.02+really25.01+dfsg-0+deb11u1 CVE ID : CVE-2022-47069 CVE-2023-31102 CVE-2023-40481 CVE-2023-52168 CVE-2023-52169 CVE-2024-11612 CVE-2025-11001 CVE-2025-11002 CVE-2025-53817 CVE-2025-55188 Debian Bug : 1111068

Multiple vulnerabilities were discovered in p7zip, a now unmaintained fork of 7-Zip, a file archiver handling multiple formats.

To address these security vulnerabilities, whose fixes are unfortunately not isolated, this update replaces p7zip with 7-Zip v25 (which now supports GNU/Linux natively), slightly modified to make it reasonably compatible with p7zip.

CVE-2022-47069

heap-buffer-overflow vulnerability via the function NArchive::NZip::CInArchive::FindCd

CVE-2023-31102

Ppmd7.c allows an integer underflow and invalid read operation via a crafted 7Z archive.

CVE-2023-40481

SquashFS File Parsing Out-Of-Bounds Write RCE

CVE-2023-52168

heap-based buffer overflow in NTFS handler

CVE-2023-52169

out-of-bounds read in NTFS handler

CVE-2024-11612

CopyCoder Infinite Loop Denial-of-Service

CVE-2025-11001

ZIP File Parsing Directory Traversal RCE

CVE-2025-11002

ZIP File Parsing Directory Traversal RCE

CVE-2025-53817

null pointer dereference in the Compound handler may lead to denial of service

CVE-2025-55188

does not always properly handle symbolic links

For Debian 11 bullseye, these problems have been fixed in version 16.02+really25.01+dfsg-0+deb11u1.

We recommend that you upgrade your p7zip packages.

For the detailed security status of p7zip please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/p7zip

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the p7zip packages.

See Also

https://security-tracker.debian.org/tracker/source-package/p7zip

https://security-tracker.debian.org/tracker/CVE-2022-47069

https://security-tracker.debian.org/tracker/CVE-2023-31102

https://security-tracker.debian.org/tracker/CVE-2023-40481

https://security-tracker.debian.org/tracker/CVE-2023-52168

https://security-tracker.debian.org/tracker/CVE-2023-52169

https://security-tracker.debian.org/tracker/CVE-2024-11612

https://security-tracker.debian.org/tracker/CVE-2025-11001

https://security-tracker.debian.org/tracker/CVE-2025-11002

https://security-tracker.debian.org/tracker/CVE-2025-53817

https://security-tracker.debian.org/tracker/CVE-2025-55188

https://packages.debian.org/source/bullseye/p7zip

Plugin Details

Severity: Medium

ID: 314237

File Name: debian_DLA-4576.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/11/2026

Updated: 5/11/2026

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-11002

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 6.9

Threat Score: 5.5

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2025-53817

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:p7zip, p-cpe:/a:debian:debian_linux:p7zip-full, cpe:/o:debian:debian_linux:11.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/11/2026

Vulnerability Publication Date: 8/22/2023

Reference Information

CVE: CVE-2022-47069, CVE-2023-31102, CVE-2023-40481, CVE-2023-52168, CVE-2023-52169, CVE-2024-11612, CVE-2025-11001, CVE-2025-11002, CVE-2025-53817, CVE-2025-55188