A flaw in Linux Kernel found in XEN (that is hypervisor for virtual machine execution that is alternative to the KVM, Kernel-based Virtual Machine). The block starting symbol (.bss) where statically allocated variables in the .bss may not be cleared correctly, affecting XenPV guests, leading to an asm_exc_page_fault, or arbitrary code execution. An unprivileged local attacker on the host, or guest, may potentially use this flaw. The vulnerability is actual for the Linux kernel mainline v5.18-rc1 through v5.19-rc7. Reference: https://github.com/torvalds/linux/commit/96e8fc5818686d4a1591bb6907e7fdb64ef29884 Additional references: https://github.com/torvalds/linux/commit/74a0032b8524ee2bd4443128c0bf9775928680b0 https://github.com/torvalds/linux/commit/fa1f57421e0b1c57843902c89728f823abc32f02 https://github.com/torvalds/linux/commit/8b87d8cec1b31ea710568ae49ba5f5146318da0d
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2116139]
This was fixed for Fedora with the 5.18.13 stable kernel updates.