Skip to content

Commit 351db34

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent a6ba7bf commit 351db34

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

db/modules_metadata_base.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91401,7 +91401,7 @@
9140191401
"jheysel-r7",
9140291402
"Rory McNamara"
9140391403
],
91404-
"description": "All versions of runc <=1.1.11, as used by containerization technologies such as Docker engine,\n and Kubernetes are vulnerable to an arbitrary file write.\n Due to a file descriptor leak it is possible to mount the host file system\n with the permissions of runc (typically root).\n\n Successfully tested on Ubuntu 22.04 with runc 1.1.7-0ubuntu1~22.04.1 and runc 1.1.11 using Docker build.\n Also tested on Debian 12.4.0 with runc 1.1.11 using Docker build.",
91404+
"description": "All versions of runc <=1.1.11, as used by containerization technologies such as Docker engine,\n and Kubernetes are vulnerable to an arbitrary file write.\n Due to a file descriptor leak it is possible to mount the host file system\n with the permissions of runc (typically root).\n\n Successfully tested on Ubuntu 22.04 with runc 1.1.7-0ubuntu1~22.04.1 and runc 1.1.11 using Docker build.\n Successfully tested on Debian 12.4.0 with runc 1.1.11 using Docker build.\n Successfully tested on Arch Linux 12/1/2024 with runc 1.1.10-1 using Docker build.",
9140591405
"references": [
9140691406
"URL-https://snyk.io/blog/cve-2024-21626-runc-process-cwd-container-breakout/",
9140791407
"URL-https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv",
@@ -91421,7 +91421,7 @@
9142191421
"targets": [
9142291422
"Auto"
9142391423
],
91424-
"mod_time": "2024-03-11 22:23:55 +0000",
91424+
"mod_time": "2025-01-09 09:59:09 +0000",
9142591425
"path": "/modules/exploits/linux/local/runc_cwd_priv_esc.rb",
9142691426
"is_install_path": true,
9142791427
"ref_name": "linux/local/runc_cwd_priv_esc",

0 commit comments

Comments
 (0)