In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Created kernel tracking bugs for this issue:
Affects: fedora-all [bug 1836943]
This was fixed for Fedora with the 5.5.7 stable kernel updates.
*** Bug 1837790 has been marked as a duplicate of this bug. ***
As the attacker must have the ability to write to these files, a possible mitigation would be to reduce the access that users and their processes would have to the files used in the attack. The files within the /proc/ filesystem can be temporarily modified with the chmod/chown command for each boot.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):