We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in RT-Thread 5.1.0. It has been rated as critical. Affected by this issue is the function sys_select of the file rt-thread/components/lwp/lwp_syscall.c of the component Parameter Handler. The manipulation of the argument timeout leads to memory corruption. The vendor explains, that "[t]he timeout parameter should be checked to check if it can be accessed correctly in kernel mode and used temporarily in kernel memory."
Eine kritische Schwachstelle wurde in RT-Thread 5.1.0 ausgemacht. Hierbei geht es um die Funktion sys_select der Datei rt-thread/components/lwp/lwp_syscall.c der Komponente Parameter Handler. Mittels dem Manipulieren des Arguments timeout mit unbekannten Daten kann eine memory corruption-Schwachstelle ausgenutzt werden.
2025-06-08: | Advisory disclosed |
2025-06-08: | VulDB entry created |
2025-06-08: | VulDB entry last update |
Zephyr Saxon (VulDB User)
vuldb.com/?id.311624 (VDB-311624 | RT-Thread Parameter lwp_syscall.c sys_select memory corruption)
vuldb.com/?ctiid.311624 (VDB-311624 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.584124 (Submit #584124 | RT-Thread 5.1.0 Improper Handling of Parameters)
github.com/RT-Thread/rt-thread/issues/10298
github.com/RT-Thread/rt-thread/issues/10298
Support options