| Title | RT-Thread 5.1.0 Improper Handling of Parameters |
|---|
| Description | A vulnerability in the sys_sigprocmask system call in the Smart version of RT-Thread v5.1.0. This vulnerability stems from insufficient validation of the *how* parameter, which is used as an array index without proper bounds checking. If exploited by a compromised user thread, this issue could lead to severe security consequences, including kernel crashes and potential unauthorized memory access. |
|---|
| Source | ⚠️ https://github.com/RT-Thread/rt-thread/issues/10300 |
|---|
| User | Zephyr Saxon (UID 80853) |
|---|
| Submission | 05/24/2025 04:46 (11 months ago) |
|---|
| Moderation | 06/08/2025 19:36 (16 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 311625 [RT-Thread 5.1.0 lwp_syscall.c sys_sigprocmask how array index] |
|---|
| Points | 20 |
|---|