CVE-2025-68322
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's parisc architecture unwinder. When creating a stack trace, the unwinder guesses the previous stack frame by reading the previous stack pointer from memory. However, it attempts to read from unaligned memory, which triggers an unalignment trap handler. This leads to a spinlock recursion and ultimately causes a kernel crash or deadlock. The issue is fixed by adding a check for memory alignment before accessing it.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or deadlock due to unaligned memory access during stack unwinding. This can lead to system instability, denial of service, or unexpected behavior on affected systems running the parisc architecture.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by checking the alignment before accessing memory in the Linux kernel unwinder for the parisc architecture. Immediate mitigation would involve updating the Linux kernel to a version that includes this fix to avoid crashes due to unaligned access in the unwinder.