Config Based CVE Matching for Linux Kernel
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore an innovative approach to CVE matching for the Linux kernel in this conference talk. Delve into the limitations of traditional "CPE search" methods used in the embedded Linux industry for identifying security vulnerabilities. Discover how these methods often lead to an excessive number of false positives, particularly when dealing with outdated kernels. Learn about two primary causes of false positives: imprecise CPE information in CVE databases and the reporting of vulnerabilities in code that may not be compiled with specific configurations. Examine a more accurate algorithm that utilizes commit IDs to pinpoint vulnerable version ranges, effectively replacing the classical approach. Gain insights into a novel method that combines multiple techniques to further reduce false positives by approximately 10%. Understand how this improved approach considers the ".config" file to determine whether vulnerable code is actually compiled, resulting in more precise and actionable security assessments for Linux kernel-based products.
Syllabus
Config Based CVE Matching for Linux Kernel - Takuma Kawai, Miraxia Edge Technology Corporation
Taught by
Linux Foundation
Tags
Related Courses
Blockchain Scalability and its Foundations in Distributed SystemsThe University of Sydney via Coursera Don's Introduction to Ethical Hacking for Beginners
Udemy Hacking und Netzwerkanalyse mit Wireshark - Der Komplettkurs
Udemy Penetration Testing of Identity, Authentication and Authorization Mechanism
Pluralsight ASP.NET MVC 5 Identity: Authentication and Authorization
LinkedIn Learning