It was discovered that the original fix for CVE-2018-6869 did not fully correct CVE-2018-6484 and CVE-2018-6869. Function __zzip_fetch_disk_trailer uses signed comparisons to check untrusted values which, in some configurations, are later used in __zzip_parse_root_directory as parameter to mmap. Remote attackers could leverage this vulnerability to cause a Denial of Service via a crafted zip file. Upstream issue: https://github.com/gdraheim/zziplib/issues/27 Upstream patch: https://github.com/gdraheim/zziplib/commit/8f48323c181e20b7e527b8be7229d6eb1148ec5f
Acknowledgments: Name: Riccardo Schirone (Red Hat)
Created zziplib tracking bugs for this issue: Affects: fedora-all [bug 1545819]
Closing this as it triggers the same vulnerability as CVE-2018-7726. *** This bug has been marked as a duplicate of bug 1554672 ***