| Título | RT-Thread 5.1.0 Improper Handling of Parameters |
|---|
| Descripción | A vulnerability in the sys_thread_sigprocmask system call in RT-Thread v5.1.0. I am opening this issue for your review, as I could not find a reporting email in the security policy of this repository. This vulnerability stems from insufficient validation of the how parameter, which is used as an array index without proper bounds checking. If exploited by a compromised user thread, this issue could lead to severe security consequences, including kernel crashes and potential unauthorized memory access. |
|---|
| Fuente | ⚠️ https://github.com/RT-Thread/rt-thread/issues/10303 |
|---|
| Usuario | Zephyr Saxon (UID 80853) |
|---|
| Sumisión | 2025-05-24 04:50 (hace 11 meses) |
|---|
| Moderación | 2025-06-08 19:36 (16 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 311627 [RT-Thread 5.1.0 lwp_syscall.c sys_thread_sigprocmask how desbordamiento de búfer] |
|---|
| Puntos | 20 |
|---|