7 High
AI Score
Confidence
High
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N
0.001 Low
EPSS
Percentile
45.3%
The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel before 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, which makes it easier for context-dependent attackers to exploit stack-based buffer overflows via a crafted application.
CPE | Name | Operator | Version |
---|---|---|---|
linux:linux_kernel | linux linux kernel | lt | 2.6.33 |
debian:debian_linux | debian debian linux | eq | 5.0 |
marc.info/?l=linux-sparc&m=126662159602378&w=2
marc.info/?l=linux-sparc&m=126662196902830&w=2
secunia.com/advisories/39830
www.debian.org/security/2010/dsa-2053
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.33
www.openwall.com/lists/oss-security/2010/02/24/1
www.openwall.com/lists/oss-security/2010/05/05/2