zip: Path name buffer overflow
Gentoo Linux Security Advisory
||GLSA 200411-16 / zip
||November 09, 2004
||May 22, 2006: 02
All supported architectures
zip contains a buffer overflow when creating a ZIP archive of files with
very long path names. This could lead to the execution of arbitrary code.
zip is a compression and file packaging utility.
zip does not check the resulting path length when doing recursive
An attacker could exploit this by enticing another user or web
application to create an archive including a specially-crafted path
name, potentially resulting in the execution of arbitrary code with the
permissions of the user running zip.
There is no known workaround at this time.
All zip users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/zip-2.3-r4"