It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
https://ubuntu.com/security/notices/USN-5003-1
https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600