CVE-2022-50575 — Linux vulnerability
6 documents5 sources
Severity
3.3LOW
No vectorEPSS
0.0%
top 88.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 22
Description
In the Linux kernel, the following vulnerability has been resolved:
xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource()
As 'kdata.num' is user-controlled data, if user tries to allocate
memory larger than(>=) MAX_ORDER, then kcalloc() will fail, it
creates a stack trace and messes up dmesg with a warning.
Call trace:
-> privcmd_ioctl
--> privcmd_ioctl_mmap_resource
Add __GFP_NOWARN in order to avoid too large allocation warning.
This is detected by static analysis using smat…
Affected Packages4 packages
▶CVEListV5linux/linux3ad0876554cafa368f574d4d408468510543e9ff — 5d68ae32d132ea2af73bc223fd64c46f85302a8b+7
🔴Vulnerability Details
3OSV▶
CVE-2022-50575: In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() As 'kdata↗2025-10-22
GHSA▶
GHSA-jhf6-8mmm-jxfr: In the Linux kernel, the following vulnerability has been resolved:
xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource()
As 'kdata↗2025-10-22