CVE-2025-68322
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/12/2025
Última modificación:
18/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
parisc: Avoid crash due to unaligned access in unwinder<br />
<br />
Guenter Roeck reported this kernel crash on his emulated B160L machine:<br />
<br />
Starting network: udhcpc: started, v1.36.1<br />
Backtrace:<br />
[] unwind_once+0x1c/0x5c<br />
[] walk_stackframe.isra.0+0x74/0xb8<br />
[] arch_stack_walk+0x28/0x38<br />
[] stack_trace_save+0x48/0x5c<br />
[] set_track_prepare+0x44/0x6c<br />
[] ___slab_alloc+0xfc4/0x1024<br />
[] __slab_alloc.isra.0+0x58/0x90<br />
[] kmem_cache_alloc_noprof+0x2ac/0x4a0<br />
[] __anon_vma_prepare+0x60/0x280<br />
[] __vmf_anon_prepare+0x68/0x94<br />
[] do_wp_page+0x8cc/0xf10<br />
[] handle_mm_fault+0x6c0/0xf08<br />
[] do_page_fault+0x110/0x440<br />
[] handle_interruption+0x184/0x748<br />
[] schedule+0x4c/0x190<br />
BUG: spinlock recursion on CPU#0, ifconfig/2420<br />
lock: terminate_lock.2+0x0/0x1c, .magic: dead4ead, .owner: ifconfig/2420, .owner_cpu: 0<br />
<br />
While creating the stack trace, the unwinder uses the stack pointer to guess<br />
the previous frame to read the previous stack pointer from memory. The crash<br />
happens, because the unwinder tries to read from unaligned memory and as such<br />
triggers the unalignment trap handler which then leads to the spinlock<br />
recursion and finally to a deadlock.<br />
<br />
Fix it by checking the alignment before accessing the memory.



