feh is a fast, lightweight imageviewer using imlib2.
Multiple vulnerabilities have been discovered in feh. Please review the CVE identifiers referenced below for details.
A malicious entity might entice a user to visit a URL using the --wget-timestamp option, thus executing arbitrary commands via shell metacharacters; a malicious local user could perform a symlink attack and overwrite arbitrary files.
There is no known workaround at this time.
All feh users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/feh-1.12"