The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel before 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, which makes it easier for context-dependent attackers to exploit stack-based buffer overflows via a crafted application.
References
Configurations
History
No history.
Information
Published : 2010-05-07 18:30
Updated : 2025-04-11 00:51
NVD link : CVE-2010-1451
Mitre link : CVE-2010-1451
CVE.ORG link : CVE-2010-1451
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write