Unrated severityNVD Advisory· Published May 7, 2010· Updated Apr 29, 2026
CVE-2010-1451
CVE-2010-1451
Description
The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel before 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, which makes it easier for context-dependent attackers to exploit stack-based buffer overflows via a crafted application.
Affected products
2- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- marc.infonvdExploitMailing ListPatchThird Party Advisory
- marc.infonvdExploitMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2010/02/24/1nvdExploitMailing ListThird Party Advisory
- secunia.com/advisories/39830nvdThird Party Advisory
- www.debian.org/security/2010/dsa-2053nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2010/05/05/2nvdMailing ListThird Party Advisory
- www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.33nvdBroken Link
News mentions
0No linked articles in our index yet.