Fixed                
                
            
            
                
                    Created: Oct 22, 2025   
                                            Updated: Oct 26, 2025                                    
                
                    
                                    
             
         
        
            
            
                                    
                        Resolved Date: Oct 26, 2025                    
                
                
                                    
                        Found In Version: 10.22.33.1                    
                
                                    
                        Fix Version: 10.22.33.5                    
                
                                        
                            Severity: Standard                        
                    
                                        
                            Applicable for: Wind River Linux LTS 22                        
                    
                                    
                        Component/s: Kernel                    
                
                
                             
         
                        
                In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource()[EOL][EOL]As 'kdata.num' is user-controlled data, if user tries to allocate[EOL]memory larger than(>=) MAX_ORDER, then kcalloc() will fail, it[EOL]creates a stack trace and messes up dmesg with a warning.[EOL][EOL]Call trace:[EOL]-> privcmd_ioctl[EOL]--> privcmd_ioctl_mmap_resource[EOL][EOL]Add __GFP_NOWARN in order to avoid too large allocation warning.[EOL]This is detected by static analysis using smatch.