Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-40337— Sentry kernel has incomplete ownership check for IRQ line manipulation

CVSS 5.1 · Medium EPSS 0.01% · P0
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-40337

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Sentry kernel has incomplete ownership check for IRQ line manipulation
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Sentry kernel is a high security level micro-kernel implementation made for high security embedded systems. A given task with one of the DEV or IO capability is able to interact with another task's IRQ line through the __sys_int_* syscall familly. Prior to version 0.4.7, this can lead to DoS and covert-channels between this task and the outer world. A patch is available in version 0.4.7. As a workaround, reduce tasks that have the DEV and IO capability to a single one.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未经验证的属主
Source: NVD (National Vulnerability Database)
Vulnerability Title
Sentry kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Sentry kernel是camelot-os开源的一个用于高安全嵌入式系统的微内核实现。 Sentry kernel 0.4.7之前版本存在安全漏洞,该漏洞源于具有DEV或IO能力的任务可通过__sys_int_*系统调用族与另一任务的IRQ线交互,可能导致拒绝服务和隐蔽信道。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
camelot-ossentry-kernel < 0.4.7 -

II. Public POCs for CVE-2026-40337

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-40337

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-40337

No comments yet


Leave a comment