Soumettre #584130: RT-Thread 5.1.0 Improper Handling of Parametersinformation

TitreRT-Thread 5.1.0 Improper Handling of Parameters
DescriptionA vulnerability in the sys_thread_sigprocmask system call in RT-Thread v5.1.0. I am opening this issue for your review, as I could not find a reporting email in the security policy of this repository. This vulnerability stems from insufficient validation of the how parameter, which is used as an array index without proper bounds checking. If exploited by a compromised user thread, this issue could lead to severe security consequences, including kernel crashes and potential unauthorized memory access.
La source⚠️ https://github.com/RT-Thread/rt-thread/issues/10303
Utilisateur
 Zephyr Saxon (UID 80853)
Soumission24/05/2025 04:50 (il y a 11 mois)
Modérer08/06/2025 19:36 (16 days later)
StatutAccepté
Entrée VulDB311627 [RT-Thread 5.1.0 lwp_syscall.c sys_thread_sigprocmask how buffer overflow]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!