eza is a modern, maintained replacement for ls, written in rust.
A vulnerability has been discovered in eza. Please review the CVE identifier referenced below for details.
A buffer overflow vulnerability in eza allows local attackers to execute arbitrary code via the .git/HEAD, .git/refs, and .git/objects components.
There is no known workaround at this time.
All eza users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-apps/eza-0.18.6"