Title | RT-Thread 5.1.0 Improper Handling of Parameters |
---|
Description | A vulnerability in the sys_thread_sigprocmask system call in RT-Thread v5.1.0. I am opening this issue for your review, as I could not find a reporting email in the security policy of this repository. This vulnerability stems from insufficient validation of the how parameter, which is used as an array index without proper bounds checking. If exploited by a compromised user thread, this issue could lead to severe security consequences, including kernel crashes and potential unauthorized memory access. |
---|
Source | ⚠️ https://github.com/RT-Thread/rt-thread/issues/10303 |
---|
User | Zephyr Saxon (UID 80853) |
---|
Submission | 05/24/2025 04:50 AM (2 months ago) |
---|
Moderation | 06/08/2025 07:36 PM (16 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 311627 [RT-Thread 5.1.0 lwp_syscall.c sys_thread_sigprocmask how array index] |
---|
Points | 20 |
---|