The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel prior to 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, which makes it easier for context-dependent malicious users to exploit stack-based buffer overflows via a crafted application.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |
||
debian debian linux 5.0 |