It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
5.13.0-19.196.11.0-8.85.3.0-18.195.3.0-24.265.4.0-18.225.4.0-21.255.4.0-24.285.4.0-25.295.4.0-26.305.4.0-28.325.4.0-29.335.4.0-31.35+22 more5.4.0-70.783.11.0-12.194.13.0-16.194.13.0-17.204.13.0-25.294.13.0-32.354.15.0-10.114.15.0-101.1024.15.0-106.1074.15.0-108.1094.15.0-109.1104.15.0-111.112+66 more4.15.0-147.1516.5.0-9.95.3.0-1003.35.3.0-1008.95.3.0-1009.105.3.0-1010.115.4.0-1005.55.4.0-1007.75.4.0-1008.85.4.0-1009.95.4.0-1011.115.4.0-1015.15+16 more5.4.0-1041.436.5.0-1008.86.11.0-1004.44.15.0-1001.14.15.0-1003.34.15.0-1005.54.15.0-1006.64.15.0-1007.74.15.0-1009.94.15.0-1010.104.15.0-1011.114.15.0-1016.164.15.0-1017.17+56 more4.15.0-1106.113Exploitability
AV:LAC:HPR:LUI:NScope
S:CImpact
C:HI:HA:HCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H