In the Linux kernel, the following vulnerability has been resolved:
xen/privcmd: Fix a possible warning in privcmdioctlmmap_resource()
As 'kdata.num' is user-controlled data, if user tries to allocate memory larger than(>=) MAX_ORDER, then kcalloc() will fail, it creates a stack trace and messes up dmesg with a warning.
Call trace: -> privcmdioctl --> privcmdioctlmmapresource
Add _GFPNOWARN in order to avoid too large allocation warning. This is detected by static analysis using smatch.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50575.json",
"cna_assigner": "Linux"
}