BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.openwall.com/lists/oss-security/2021/04/08/1
https://security.netapp.com/advisory/ntap-20210604-0006/
https://news.ycombinator.com/item?id=26757760
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html