Docker is the world’s leading software containerization platform.
+Multiple vulnerabilities have been discovered in Docker. Please review + the CVE identifiers referenced below for details. +
+Please review the referenced CVE identifiers for details.
+There is no known workaround at this time.
+All Docker 19.x users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-emulation/docker-19.03.15"
+
+
+ All Docker 20.x users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-emulation/docker-20.10.3"
+
+ The GNU Binutils are a collection of tools to create, modify and analyse + binary files. Many of the files use BFD, the Binary File Descriptor + library, to do low-level manipulation. +
+Multiple vulnerabilities have been discovered in Binutils. Please review + the CVE identifiers referenced below for details. +
+Please review the referenced CVE identifiers for details.
+There is no known workaround at this time.
+All Binutils users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=sys-devel/binutils-2.35.2"
+
+ Tor is an implementation of second generation Onion Routing, a + connection-oriented anonymizing communication service. +
+Multiple vulnerabilities have been discovered in Tor. Please review the + CVE identifiers referenced below for details. +
+Please review the referenced CVE identifiers for details.
+There is no known workaround at this time.
+All Tor 0.4.6.x users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-vpn/tor-0.4.6.5"
+
+
+ All Tor 0.4.5.x users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-vpn/tor-0.4.5.9"
+
+
+ All Tor 0.4.4.x users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-vpn/tor-0.4.4.9"
+
+ runC is a CLI tool for spawning and running containers according to the + OCI specification. +
+A vulnerability in runC could allow an attacker to achieve privilege + escalation if specific mount configuration prerequisites are satisfied. +
+An attacker may be able to escalation privileges to gain access to the + host system. +
+There is no known workaround at this time.
+All runC users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-emulation/runc-1.0.0_rc95"
+
+
+