Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2022-42150
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-19 Oct, 2023 | 20:15
Updated At-07 Nov, 2023 | 03:53

TinyLab linux-lab v1.1-rc1 and cloud-labv0.8-rc2, v1.1-rc1 are vulnerable to insecure permissions. The default configuration could cause Container Escape.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.110.0CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CPE Matches

tinylab
tinylab
>>cloud_lab>>0.8
cpe:2.3:a:tinylab:cloud_lab:0.8:rc2:*:*:*:*:*:*
tinylab
tinylab
>>cloud_lab>>1.1
cpe:2.3:a:tinylab:cloud_lab:1.1:rc1:*:*:*:*:*:*
tinylab
tinylab
>>linux_lab>>1.1
cpe:2.3:a:tinylab:linux_lab:1.1:rc1:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-276Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/eBPF-Research/eBPF-Attack/blob/main/PoC.md#attack-requirementscve@mitre.org
Exploit
Third Party Advisory
https://github.com/tinyclub/cloud-lab/blob/d19ff92713685a7fb84b423dea6a184b25c378c9/configs/common/seccomp-profiles-default.jsoncve@mitre.org
Patch
https://github.com/tinyclub/linux-lab/issues/14cve@mitre.org
Issue Tracking
https://hackmd.io/%40UR9gnr32QymtmtZHnZceOw/ry428EZGocve@mitre.org
N/A
https://www.usenix.org/conference/usenixsecurity23/presentation/hecve@mitre.org
Exploit
Third Party Advisory
Change History
0Changes found

Details not found