First published: Fri May 07 2010(Updated: )
The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel before 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, which makes it easier for context-dependent attackers to exploit stack-based buffer overflows via a crafted application.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <2.6.33 | |
Debian GNU/Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1451 is considered a high severity vulnerability due to its impact on the non-executable stack implementation.
To fix CVE-2010-1451, upgrade to Linux kernel version 2.6.33 or later.
The potential consequences of CVE-2010-1451 include increased risk of execution of arbitrary code due to the improper implementation of non-executable stacks.
CVE-2010-1451 affects the Linux kernel versions prior to 2.6.33, particularly on the SPARC platform.
CVE-2010-1451 is not a risk for systems that are running supported versions of the Linux kernel that have been patched.