The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.
https://www.oracle.com/security-alerts/cpuApr2021.html
https://usn.ubuntu.com/4526-1/
https://usn.ubuntu.com/4525-1/
https://security.netapp.com/advisory/ntap-20200814-0004/
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://github.com/torvalds/linux/commit/f227e3ec3b5cad859ad15666874405e8c1bbc1d4
https://arxiv.org/pdf/2012.07432.pdf
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html