| Título | RT-Thread 5.1.0 Improper Handling of Parameters |
|---|
| Descripción | A vulnerability in the sys_select system call in Smart version of RT-Thread v5.1.0. I am opening this issue for your review, as I could not find a reporting email in the security policy of this repository. This vulnerability stems from insufficient pointer validation, particularly for the timeout parameter. The code only checks if the pointer is NULL but fails to verify whether the pointer points to valid memory. If exploited by a compromised user thread, this issue could lead to severe security consequences, including kernel crashes and potential unauthorized memory access. |
|---|
| Fuente | ⚠️ https://github.com/RT-Thread/rt-thread/issues/10298 |
|---|
| Usuario | Zephyr Saxon (UID 80853) |
|---|
| Sumisión | 2025-05-24 04:44 (hace 11 meses) |
|---|
| Moderación | 2025-06-08 19:36 (16 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 311624 [RT-Thread 5.1.0 Parameter lwp_syscall.c sys_select timeout desbordamiento de búfer] |
|---|
| Puntos | 20 |
|---|