It was discovered that the eBPF implementation in the Linux kernel did not properly validate the memory size of certain ring buffer operation arguments. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
5.11.0-1025.27~20.04.15.11.0-1025.27~20.04.15.11.0-1026.29~20.04.15.11.0-46.51~20.04.15.10.0-1055.585.11.0-1025.27~20.04.1