The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel before 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, which makes it easier for context-dependent attackers to exploit stack-based buffer overflows via a crafted application.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2010-05-07T18:23:00
Updated: 2024-08-07T01:21:19.214Z
Reserved: 2010-04-15T00:00:00
Link: CVE-2010-1451
Vulnrichment
No data.
NVD
Status : Modified
Published: 2010-05-07T18:30:01.610
Modified: 2024-11-21T01:14:27.293
Link: CVE-2010-1451
Redhat
No data.