| शीर्षक | RT-Thread 5.1.0 Improper Handling of Parameters |
|---|
| विवरण | A vulnerability in the sys_sendto system call in the Smart version of RT-Thread v5.1.0. This vulnerability stems from insufficient pointer validation in the sockaddr_tolwip function, which is called by sys_sendto. The code only checks if the pointer is NULL but fails to verify whether the pointer points to valid memory. If exploited by a compromised user thread, this issue could lead to severe security consequences, including kernel crashes and potential unauthorized memory access. |
|---|
| स्रोत | ⚠️ https://github.com/RT-Thread/rt-thread/issues/10299 |
|---|
| उपयोगकर्ता | Zephyr Saxon (UID 80853) |
|---|
| सबमिशन | 24/05/2025 04:49 AM (11 महीनों पहले) |
|---|
| संयम | 08/06/2025 07:36 PM (16 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 311626 [RT-Thread 5.1.0 lwp_syscall.c csys_sendto सेवा अस्वीकार] |
|---|
| अंक | 20 |
|---|