| शीर्षक | RT-Thread 5.1.0 Improper Handling of Parameters |
|---|
| विवरण | A vulnerability in the sys_thread_sigprocmask system call in RT-Thread v5.1.0. I am opening this issue for your review, as I could not find a reporting email in the security policy of this repository. This vulnerability stems from insufficient validation of the how parameter, which is used as an array index without proper bounds checking. If exploited by a compromised user thread, this issue could lead to severe security consequences, including kernel crashes and potential unauthorized memory access. |
|---|
| स्रोत | ⚠️ https://github.com/RT-Thread/rt-thread/issues/10303 |
|---|
| उपयोगकर्ता | Zephyr Saxon (UID 80853) |
|---|
| सबमिशन | 24/05/2025 04:50 AM (11 महीनों पहले) |
|---|
| संयम | 08/06/2025 07:36 PM (16 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 311627 [RT-Thread 5.1.0 lwp_syscall.c sys_thread_sigprocmask how बफ़र ओवरफ़्लो] |
|---|
| अंक | 20 |
|---|