Linux 5.5 overhauled the internal state handling for the iopl() and ioperm() system calls. Unfortunately, one aspect on context switch wasn't wired up correctly for the Xen PVOps case.
Acknowledgments: Name: the Xen project
External References: https://xenbits.xen.org/xsa/advisory-329.html
Statement: The vulnerability can only be exploited in domains which have been granted access to IO ports by Xen. This is typically only the hardware domain, and PV guests configured with PCI passthrough. x86 HVM/PVH guests are not affected by this flaw.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1857794]
This was fixed for Fedora with the 5.7.10 stable kernel updates.