An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information. https://nvd.nist.gov/vuln/detail/CVE-2021-4204 Mitigation: Check the privileged state at /proc/sys/kernel/unprivileged_bpf_disabled. It can have these values: 0: "unprivileged enable" 1: "only privileged users enable (until reboot)". If this value is set, it cannot be cleared until reboot To mitigate this issue, set kernel.unprivileged_bpf_disabled to 1. This setting can be changed by root with a systemctl: sysctl kernel.unprivileged_bpf_disabled=1