Overflowing the Kernel Stack with BPF - Security Implications and Mitigations
Offered By: Linux Plumbers Conference via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security implications of eBPF's interaction with the kernel stack in this 23-minute conference talk from the Linux Plumbers Conference. Delve into two fundamental problems in the BPF runtime environment that allow kernel stack overflow. Examine how BPF programs can inherit limited kernel stack space and potentially exceed it, despite verifier checks. Investigate the incomplete restrictions on BPF program nesting, leading to stack exhaustion. Learn about BPF program attachment, stack interactions, and known difficulties with limited kernel stacks. Witness demonstrations of stack overflow scenarios and discuss mitigation strategies for these and future issues arising from implicit verifier assumptions about the runtime execution environment.
Syllabus
Overflowing the kernel stack with BPF - Dan Williams, Sai Roop Somaraju, Siddharth Chintamaneni
Taught by
Linux Plumbers Conference
Related Courses
100+ Exercises - Advanced Python ProgrammingUdemy 230+ Exercises - Python for Data Science - NumPy + Pandas
Udemy Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy Abusing Normality - Data Exfiltration in Plain Site
LASCON via YouTube Analogue Evolution, Digital Revolution - Tipping Points in Technology
GOTO Conferences via YouTube