إرسال #584127: RT-Thread 5.1.0 Improper Handling of Parametersالمعلومات

عنوانRT-Thread 5.1.0 Improper Handling of Parameters
الوصفA vulnerability in the sys_sigprocmask system call in the Smart version of RT-Thread v5.1.0. This vulnerability stems from insufficient validation of the *how* parameter, which is used as an array index without proper bounds checking. If exploited by a compromised user thread, this issue could lead to severe security consequences, including kernel crashes and potential unauthorized memory access.
المصدر⚠️ https://github.com/RT-Thread/rt-thread/issues/10300
المستخدم
 Zephyr Saxon (UID 80853)
ارسال24/05/2025 04:46 AM (11 أشهر منذ)
الاعتدال08/06/2025 07:36 PM (16 days later)
الحالةتمت الموافقة
إدخال VulDB311625 [RT-Thread 5.1.0 lwp_syscall.c sys_sigprocmask how تلف الذاكرة]
النقاط20

Might our Artificial Intelligence support you?

Check our Alexa App!