We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability, which was classified as critical, has been found in RT-Thread 5.1.0. This issue affects the function sys_thread_sigprocmask of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument how leads to improper validation of array index.
Eine Schwachstelle wurde in RT-Thread 5.1.0 entdeckt. Sie wurde als kritisch eingestuft. Dies betrifft die Funktion sys_thread_sigprocmask der Datei rt-thread/components/lwp/lwp_syscall.c. Durch Manipulieren des Arguments how mit unbekannten Daten kann eine improper validation of array index-Schwachstelle ausgenutzt werden.
Improper Validation of Array Index
2025-06-08: | Advisory disclosed |
2025-06-08: | VulDB entry created |
2025-06-08: | VulDB entry last update |
Zephyr Saxon (VulDB User)
vuldb.com/?id.311627 (VDB-311627 | RT-Thread lwp_syscall.c sys_thread_sigprocmask array index)
vuldb.com/?ctiid.311627 (VDB-311627 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.584130 (Submit #584130 | RT-Thread 5.1.0 Improper Handling of Parameters)
github.com/RT-Thread/rt-thread/issues/10303
Support options