fastjar is a Java archiver written in C.
Two directory traversal vulnerabilities have been discovered in fastjar. Please review the CVE identifiers referenced below for details.
A remote attacker could entice a user to open a specially crafted JAR file, possibly resulting in the creation or truncation of arbitrary files.
There is no known workaround at this time.
All fastjar users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/fastjar-0.98-r1"