{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50575","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-10-22T13:20:23.761Z","datePublished":"2025-10-22T13:23:29.595Z","dateUpdated":"2026-05-11T19:22:04.640Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:22:04.640Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nxen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource()\n\nAs 'kdata.num' is user-controlled data, if user tries to allocate\nmemory larger than(>=) MAX_ORDER, then kcalloc() will fail, it\ncreates a stack trace and messes up dmesg with a warning.\n\nCall trace:\n-> privcmd_ioctl\n--> privcmd_ioctl_mmap_resource\n\nAdd __GFP_NOWARN in order to avoid too large allocation warning.\nThis is detected by static analysis using smatch."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/xen/privcmd.c"],"versions":[{"version":"3ad0876554cafa368f574d4d408468510543e9ff","lessThan":"5d68ae32d132ea2af73bc223fd64c46f85302a8b","status":"affected","versionType":"git"},{"version":"3ad0876554cafa368f574d4d408468510543e9ff","lessThan":"4f983ee5e5de924d93a7bbb4e6f68f38c6256cd5","status":"affected","versionType":"git"},{"version":"3ad0876554cafa368f574d4d408468510543e9ff","lessThan":"46026bb057c35f5bb111bf95e00cd8366d2e34d4","status":"affected","versionType":"git"},{"version":"3ad0876554cafa368f574d4d408468510543e9ff","lessThan":"0bf874183b32eae2cc20e3c5be38ec3d33e7e564","status":"affected","versionType":"git"},{"version":"3ad0876554cafa368f574d4d408468510543e9ff","lessThan":"e0c5f1058ed96f2b7487560c4c4cbd768d13d065","status":"affected","versionType":"git"},{"version":"3ad0876554cafa368f574d4d408468510543e9ff","lessThan":"4da411086f5ab32f811a89ef804980ec106ebb65","status":"affected","versionType":"git"},{"version":"3ad0876554cafa368f574d4d408468510543e9ff","lessThan":"8b997b2bb2c53b76a6db6c195930e9ab8e4b0c79","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/xen/privcmd.c"],"versions":[{"version":"4.18","status":"affected"},{"version":"0","lessThan":"4.18","status":"unaffected","versionType":"semver"},{"version":"4.19.270","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.229","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.163","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.86","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.16","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.2","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"4.19.270"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"5.4.229"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"5.10.163"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"5.15.86"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.0.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.1.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/5d68ae32d132ea2af73bc223fd64c46f85302a8b"},{"url":"https://git.kernel.org/stable/c/4f983ee5e5de924d93a7bbb4e6f68f38c6256cd5"},{"url":"https://git.kernel.org/stable/c/46026bb057c35f5bb111bf95e00cd8366d2e34d4"},{"url":"https://git.kernel.org/stable/c/0bf874183b32eae2cc20e3c5be38ec3d33e7e564"},{"url":"https://git.kernel.org/stable/c/e0c5f1058ed96f2b7487560c4c4cbd768d13d065"},{"url":"https://git.kernel.org/stable/c/4da411086f5ab32f811a89ef804980ec106ebb65"},{"url":"https://git.kernel.org/stable/c/8b997b2bb2c53b76a6db6c195930e9ab8e4b0c79"}],"title":"xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource()","x_generator":{"engine":"bippy-1.2.0"}}}}