CVE-2025-5865

A vulnerability was found in RT-Thread 5.1.0. It has been rated as critical. Affected by this issue is the function sys_select of the file rt-thread/components/lwp/lwp_syscall.c of the component Parameter Handler. The manipulation of the argument timeout leads to memory corruption. The vendor explains, that "[t]he timeout parameter should be checked to check if it can be accessed correctly in kernel mode and used temporarily in kernel memory."
References
Link Resource
https://github.com/RT-Thread/rt-thread/issues/10298 Exploit Issue Tracking Third Party Advisory
https://github.com/RT-Thread/rt-thread/issues/10298#issuecomment-2894952150 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.311624 Permissions Required VDB Entry
https://vuldb.com/?id.311624 Third Party Advisory VDB Entry
https://vuldb.com/?submit.584124 Third Party Advisory VDB Entry
https://github.com/RT-Thread/rt-thread/issues/10298 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:rt-thread:rt-thread:5.1.0:*:*:*:*:*:*:*

History

11 Jul 2025, 18:22

Type Values Removed Values Added
CPE cpe:2.3:a:rt-thread:rt-thread:5.1.0:*:*:*:*:*:*:*
CWE NVD-CWE-Other
First Time Rt-thread
Rt-thread rt-thread
Summary
  • (es) Se encontró una vulnerabilidad en RT-Thread 5.1.0. Se ha clasificado como crítica. Este problema afecta a la función sys_select del archivo rt-thread/components/lwp/lwp_syscall.c del controlador de parámetros del componente. La manipulación del argumento timeout provoca corrupción de memoria. El proveedor explica que «se debe comprobar el parámetro timeout para comprobar si se puede acceder correctamente en modo kernel y si se puede usar temporalmente en la memoria del kernel».
References () https://github.com/RT-Thread/rt-thread/issues/10298 - () https://github.com/RT-Thread/rt-thread/issues/10298 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/RT-Thread/rt-thread/issues/10298#issuecomment-2894952150 - () https://github.com/RT-Thread/rt-thread/issues/10298#issuecomment-2894952150 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.311624 - () https://vuldb.com/?ctiid.311624 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.311624 - () https://vuldb.com/?id.311624 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.584124 - () https://vuldb.com/?submit.584124 - Third Party Advisory, VDB Entry

09 Jun 2025, 14:15

Type Values Removed Values Added
References () https://github.com/RT-Thread/rt-thread/issues/10298 - () https://github.com/RT-Thread/rt-thread/issues/10298 -

09 Jun 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-09 07:15

Updated : 2025-07-11 18:22


NVD link : CVE-2025-5865

Mitre link : CVE-2025-5865

CVE.ORG link : CVE-2025-5865


JSON object : View

Products Affected

rt-thread

  • rt-thread
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

NVD-CWE-Other