提交 #584127: RT-Thread 5.1.0 Improper Handling of Parameters信息

标题RT-Thread 5.1.0 Improper Handling of Parameters
描述A vulnerability in the sys_sigprocmask system call in the Smart version of RT-Thread v5.1.0. This vulnerability stems from insufficient validation of the *how* parameter, which is used as an array index without proper bounds checking. If exploited by a compromised user thread, this issue could lead to severe security consequences, including kernel crashes and potential unauthorized memory access.
来源⚠️ https://github.com/RT-Thread/rt-thread/issues/10300
用户
 Zephyr Saxon (UID 80853)
提交2025-05-24 04時46分 (11 月前)
管理2025-06-08 19時36分 (16 days later)
状态已接受
VulDB条目311625 [RT-Thread 5.1.0 lwp_syscall.c sys_sigprocmask how 内存损坏]
积分20

Want to know what is going to be exploited?

We predict KEV entries!