From 9b5a339a8dbd2a2e152812113e263da2d07c422a Mon Sep 17 00:00:00 2001 From: Sk3pper <13051136+Sk3pper@users.noreply.github.com> Date: Sun, 10 Nov 2024 18:27:43 +0100 Subject: [PATCH] add link to new article --- .../posts/cve-2024-21626/playing-with-cve-2024-21626/index.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/content/posts/cve-2024-21626/playing-with-cve-2024-21626/index.md b/content/posts/cve-2024-21626/playing-with-cve-2024-21626/index.md index 3614a7c..345285c 100644 --- a/content/posts/cve-2024-21626/playing-with-cve-2024-21626/index.md +++ b/content/posts/cve-2024-21626/playing-with-cve-2024-21626/index.md @@ -20,6 +20,8 @@ The content of this article is for educational and research use only. The inform {{< /alert >}} --- +# Related Article +While investigating **CVE-2024–21626**, I discovered an overlooked vulnerability in older versions of Docker and runC. To learn more about what I found, read the following article: “[Exploring Hidden Vulnerabilities in Legacy Docker Versions: Lessons from CVE-2024–21626](https://sk3pper.github.io/posts/cve-2024-21626/exploring-hidden-vulnerabilities-in-legacy-docker-versions/)”. # 1. Introduction ## 1.1 Why this article?