Xen is a bare-metal hypervisor.
+Multiple vulnerabilities have been discovered in Xen. Please review the + referenced CVE identifiers for details. +
+A local attacker could escalate privileges, cause a Denial of Service + condition, obtain sensitive information, or have other unspecified + impacts. +
+There is no known workaround at this time.
+All Xen users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.7.3"
+
+
+ All Xen pvgrub users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-emulation/xen-pvgrub-4.7.3"
+
+
+ All Xen Tools users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-emulation/xen-tools-4.7.3"
+
+ Ruby is an interpreted object-oriented programming language. The + elaborate standard library includes an HTTP server (“WEBRick”) and a + class for XML parsing (“REXML”). +
+Multiple vulnerabilities have been discovered in Ruby. Please review the + referenced CVE identifiers for details. +
+ +A remote attacker could execute arbitrary code, cause a Denial of + Service condition, or obtain sensitive information. +
+ +There is no known workaround at this time.
+All Ruby users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-lang/ruby-2.2.8"
+
+ libarchive is a library for manipulating different streaming archive + formats, including certain tar variants, several cpio formats, and both + BSD and GNU ar variants. +
+Multiple vulnerabilities have been discovered in libarchive. Please + review the referenced CVE identifiers for details. +
+ +A remote attacker, via a specially crafted file, could possibly cause a + Denial of Service condition. +
+ +There is no known workaround at this time.
+All libarchive users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-arch/libarchive-3.3.0"
+
+ Nagios is an open source host, service and network monitoring program.
+Multiple vulnerabilities have been discovered in Nagios. Please review + the referenced CVE identifiers for details. +
+ +A remote attacker could possibly escalate privileges to root, thus + allowing the execution of arbitrary code, by leveraging CVE-2016-9565. + Additionally, a local attacker could cause a Denial of Service condition + against arbitrary processes due to the improper dropping of privileges. +
+There is no known workaround at this time.
+All Nagios users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-4.3.3"
+
+