A vulnerability was found in RT-Thread 5.1.0. It has been rated as critical. Affected by this issue is the function sys_select of the file rt-thread/components/lwp/lwp_syscall.c of the component Parameter Handler. The manipulation of the argument timeout leads to memory corruption. The vendor explains, that "[t]he timeout parameter should be checked to check if it can be accessed correctly in kernel mode and used temporarily in kernel memory."
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://vuldb.com/?id.311624 | third party advisory technical description vdb entry |
https://vuldb.com/?ctiid.311624 | permissions required vdb entry signature |
https://vuldb.com/?submit.584124 | third party advisory vdb entry |
https://github.com/RT-Thread/rt-thread/issues/10298 | third party advisory exploit issue tracking |
https://github.com/RT-Thread/rt-thread/issues/10298#issuecomment-2894952150 | third party advisory issue tracking exploit |