{"id":"MGASA-2016-0202","summary":"Updated p7zip packages fix CVE-2016-2335","details":"Updated p7zip package fixes security vulnerability:\n\nAn out of bound read vulnerability exists in the CInArchive::ReadFileItem\nmethod functionality of 7zip for handling UDF files that can lead to denial of\nservice or code execution (CVE-2016-2335).\n","modified":"2026-01-30T03:37:49.815149Z","published":"2016-05-21T22:11:24Z","related":["CVE-2016-2335"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0202.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18490"},{"type":"REPORT","url":"http://www.talosintel.com/reports/TALOS-2016-0094/"},{"type":"REPORT","url":"http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html"}],"affected":[{"package":{"name":"p7zip","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/p7zip?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.20.1-6.2.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0202.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}