This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201701-34
(runC: Privilege escalation)
A vulnerability was discovered in runC that allows additional container
processes via ‘runc exec’ to be ptraced by the pid 1 of the
container. This allows the main processes of the container, if running
as root, to gain access to file-descriptors of these new processes.
An attacker, who is able to successfully escape the container or modify
runC’s state before process initialization, could escalate privileges.
There is no known workaround at this time.
See also :
All runC users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-emulation/runc-1.0.0_rc2-r2'
Risk factor :
Medium / CVSS Base Score : 4.4