| Title | RT-Thread v5.1.0 Improper Handling of Parameters |
|---|
| Description | Many other syscalls (specifically 36) have privilege escalation vulnerabilities related to parameter checking in the latest version (v5.1.0). If a user thread is compromised, this issue could lead to severe security consequences, as it breaks the user-kernel isolation.
The specific details have been reported in an issue on its GitHub, and they are working on a fix. You can check the details through the issue link (https://github.com/RT-Thread/rt-thread/issues/9877). |
|---|
| Source | ⚠️ https://github.com/RT-Thread/rt-thread/issues/9877 |
|---|
| User | Zephyr Saxon (UID 80853) |
|---|
| Submission | 01/27/2025 07:27 AM (1 Year ago) |
|---|
| Moderation | 02/07/2025 05:28 PM (11 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 295021 [RT-Thread up to 5.1.0 lwp_syscall.c arg[0] information disclosure] |
|---|
| Points | 20 |
|---|