| Título | RT-Thread 5.1.0 Improper Handling of Parameters |
|---|
| Descripción | A critical privilege escalation vulnerability in the sys_recvfrom system call in RT-Thread v5.1.0. This vulnerability stems from insufficient validation of the from parameter pointer in the sockaddr_tomusl function. An attacker can control this pointer to write to arbitrary kernel memory locations, potentially leading to privilege escalation and system compromise. |
|---|
| Fuente | ⚠️ https://github.com/RT-Thread/rt-thread/issues/10304 |
|---|
| Usuario | Zephyr Saxon (UID 80853) |
|---|
| Sumisión | 2025-05-24 05:05 (hace 11 meses) |
|---|
| Moderación | 2025-06-08 19:36 (16 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 311628 [RT-Thread 5.1.0 lwp_syscall.c sys_recvfrom desbordamiento de búfer] |
|---|
| Puntos | 19 |
|---|