Log

ASA-202004-5 edited at 01 Apr 2020 08:50:50
Impact
+ A remote attacker is able to execute arbitrary code on the affected host.
ASA-202004-3 edited at 01 Apr 2020 08:50:31
Workaround
+ BPF access can be restricted to privileged users by setting kernel.unprivileged_bpf_disabled to 1:
+
+ # sysctl -w kernel.unprivileged_bpf_disabled=1
Impact
+ An unprivileged local user or process can crash the kernel, resulting in a denial of service, or potentially gain root privileges on the system.
ASA-202004-4 edited at 01 Apr 2020 08:50:29
Workaround
+ BPF access can be restricted to privileged users by setting kernel.unprivileged_bpf_disabled to 1:
+
+ # sysctl -w kernel.unprivileged_bpf_disabled=1
Impact
+ An unprivileged local user or process can crash the kernel, resulting in a denial of service, or potentially gain root privileges on the system.
ASA-202004-5 created at 01 Apr 2020 08:49:49
ASA-202004-4 created at 01 Apr 2020 08:48:49
ASA-202004-3 created at 01 Apr 2020 08:48:43
ASA-202004-2 created at 01 Apr 2020 08:48:35
ASA-202003-14 deleted at 01 Apr 2020 08:48:03
Workaround
Impact
- An unprivileged local user or process can crash the kernel, resulting in a denial of service, or potentially gain root privileges on the system.
ASA-202003-15 deleted at 01 Apr 2020 08:47:58
Workaround
Impact
- An unprivileged local user or process can crash the kernel, resulting in a denial of service, or potentially gain root privileges on the system.
ASA-202003-16 deleted at 01 Apr 2020 08:47:55
Workaround
Impact
- An unprivileged local user or process can crash the kernel, resulting in a denial of service, or potentially gain root privileges on the system.