Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
jenkins-metasploit committed Jan 10, 2025
1 parent a6ba7bf commit 351db34
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -91401,7 +91401,7 @@
"jheysel-r7",
"Rory McNamara"
],
"description": "All versions of runc <=1.1.11, as used by containerization technologies such as Docker engine,\n and Kubernetes are vulnerable to an arbitrary file write.\n Due to a file descriptor leak it is possible to mount the host file system\n with the permissions of runc (typically root).\n\n Successfully tested on Ubuntu 22.04 with runc 1.1.7-0ubuntu1~22.04.1 and runc 1.1.11 using Docker build.\n Also tested on Debian 12.4.0 with runc 1.1.11 using Docker build.",
"description": "All versions of runc <=1.1.11, as used by containerization technologies such as Docker engine,\n and Kubernetes are vulnerable to an arbitrary file write.\n Due to a file descriptor leak it is possible to mount the host file system\n with the permissions of runc (typically root).\n\n Successfully tested on Ubuntu 22.04 with runc 1.1.7-0ubuntu1~22.04.1 and runc 1.1.11 using Docker build.\n Successfully tested on Debian 12.4.0 with runc 1.1.11 using Docker build.\n Successfully tested on Arch Linux 12/1/2024 with runc 1.1.10-1 using Docker build.",
"references": [
"URL-https://snyk.io/blog/cve-2024-21626-runc-process-cwd-container-breakout/",
"URL-https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv",
Expand All @@ -91421,7 +91421,7 @@
"targets": [
"Auto"
],
"mod_time": "2024-03-11 22:23:55 +0000",
"mod_time": "2025-01-09 09:59:09 +0000",
"path": "/modules/exploits/linux/local/runc_cwd_priv_esc.rb",
"is_install_path": true,
"ref_name": "linux/local/runc_cwd_priv_esc",
Expand Down

0 comments on commit 351db34

Please sign in to comment.