-
Notifications
You must be signed in to change notification settings - Fork 5.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug] Insufficient parameter validation in the syscall implementation in RT-Thread Smart #9877
Comments
In addition to the syscall I reported earlier (i.e., Vulnerable Code LocationThe vulnerability is present in the
Vulnerability DescriptionThese syscalls fail to validate pointer parameters, particularly kernel object and buffer pointers. For example, in the
ImpactThese vulnerabilities result in serious privilege escalation, potentially allowing unauthorized memory access and control flow hijacking. RecommendationI strongly recommend implementing proper validation checks for the parameters in these syscalls, particularly for kernel object pointers and buffer pointers. I am more than happy to provide additional details or clarification if needed. |
Please feel free to contact me at [email protected] for further information or assistance. |
RT-Thread Version
v5.1.0
Hardware Type/Architectures
None
Develop Toolchain
GCC
Describe the bug
Basic Information
I am reporting a potential vulnerability that has been identified in the latest version of RT-Thread (i.e., v5.1.0). I am opening this issue for your review, as I could not find a reporting email in the security policy of this repository. Kindly let me know if you intend to request a CVE ID upon confirmation of the vulnerability. I am more than happy to provide additional details or clarification if needed.
Summary
A critical information leak vulnerability (CWE-200) has been identified in the RT-Thread system call implementations. This vulnerability allows an attacker to read sensitive memory data through an unvalidated char pointer.
Details
Vulnerable Code Location
The vulnerability resides in the
rt-thread/components/lwp/lwp_syscall.c
file.Vulnerability Description
When RT-Thread Smart is enabled, user and kernel spaces are isolated. However, insufficient parameter validation for arg[0], which represents the char * pointer, can lead to a potential information leak. Specifically, a malicious user thread could pass crafted parameters that cause this pointer to reference kernel memory, potentially exposing sensitive data.
Impact
This vulnerability results in an information leak, which could allow unauthorized access to sensitive kernel data.
Other additional context
No response
The text was updated successfully, but these errors were encountered: