{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T19:11:27.651","vulnerabilities":[{"cve":{"id":"CVE-2025-68322","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-16T16:16:11.793","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nparisc: Avoid crash due to unaligned access in unwinder\n\nGuenter Roeck reported this kernel crash on his emulated B160L machine:\n\nStarting network: udhcpc: started, v1.36.1\n Backtrace:\n  [<104320d4>] unwind_once+0x1c/0x5c\n  [<10434a00>] walk_stackframe.isra.0+0x74/0xb8\n  [<10434a6c>] arch_stack_walk+0x28/0x38\n  [<104e5efc>] stack_trace_save+0x48/0x5c\n  [<105d1bdc>] set_track_prepare+0x44/0x6c\n  [<105d9c80>] ___slab_alloc+0xfc4/0x1024\n  [<105d9d38>] __slab_alloc.isra.0+0x58/0x90\n  [<105dc80c>] kmem_cache_alloc_noprof+0x2ac/0x4a0\n  [<105b8e54>] __anon_vma_prepare+0x60/0x280\n  [<105a823c>] __vmf_anon_prepare+0x68/0x94\n  [<105a8b34>] do_wp_page+0x8cc/0xf10\n  [<105aad88>] handle_mm_fault+0x6c0/0xf08\n  [<10425568>] do_page_fault+0x110/0x440\n  [<10427938>] handle_interruption+0x184/0x748\n  [<11178398>] schedule+0x4c/0x190\n  BUG: spinlock recursion on CPU#0, ifconfig/2420\n  lock: terminate_lock.2+0x0/0x1c, .magic: dead4ead, .owner: ifconfig/2420, .owner_cpu: 0\n\nWhile creating the stack trace, the unwinder uses the stack pointer to guess\nthe previous frame to read the previous stack pointer from memory.  The crash\nhappens, because the unwinder tries to read from unaligned memory and as such\ntriggers the unalignment trap handler which then leads to the spinlock\nrecursion and finally to a deadlock.\n\nFix it by checking the alignment before accessing the memory."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/009270208f76456c2cefcd565da263b90bb2eadb","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/9ac1f44723f26881b9fe7e69c7bc25397b879155","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/fd9f30d1038ee1624baa17a6ff11effe5f7617cb","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}