ASA-202004-4 - log back

ASA-202004-4 edited at 01 Apr 2020 20:34:00
Workaround
- BPF access can be restricted to privileged users by setting kernel.unprivileged_bpf_disabled to 1:
+ BPF access can be restricted to privileged users by setting
+ kernel.unprivileged_bpf_disabled to 1:
# sysctl -w kernel.unprivileged_bpf_disabled=1
ASA-202004-4 edited at 01 Apr 2020 08:50:29
Workaround
+ BPF access can be restricted to privileged users by setting kernel.unprivileged_bpf_disabled to 1:
+
+ # sysctl -w kernel.unprivileged_bpf_disabled=1
Impact
+ An unprivileged local user or process can crash the kernel, resulting in a denial of service, or potentially gain root privileges on the system.
ASA-202004-4 created at 01 Apr 2020 08:48:49