RT-Thread through 5.0.2 generates random numbers with a weak algorithm of "seed = 214013L * seed + 2531011L; return (seed >> 16) & 0x7FFF;" in calc_random in drivers/misc/rt_random.c.
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.
Link | Tags |
---|---|
https://github.com/RT-Thread/rt-thread/issues/8283 | mitigation issue tracking |
https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt | third party advisory |
https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/ | third party advisory |
https://seclists.org/fulldisclosure/2024/Mar/28 | mailing list |
http://www.openwall.com/lists/oss-security/2024/03/05/1 | issue tracking mailing list |