YoVDO

Overflowing the Kernel Stack with BPF - Security Implications and Mitigations

Offered By: Linux Plumbers Conference via YouTube

Tags

eBPF Courses Security Vulnerabilities Courses Stack Overflows Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security implications of eBPF's interaction with the kernel stack in this 23-minute conference talk from the Linux Plumbers Conference. Delve into two fundamental problems in the BPF runtime environment that allow kernel stack overflow. Examine how BPF programs can inherit limited kernel stack space and potentially exceed it, despite verifier checks. Investigate the incomplete restrictions on BPF program nesting, leading to stack exhaustion. Learn about BPF program attachment, stack interactions, and known difficulties with limited kernel stacks. Witness demonstrations of stack overflow scenarios and discuss mitigation strategies for these and future issues arising from implicit verifier assumptions about the runtime execution environment.

Syllabus

Overflowing the kernel stack with BPF - Dan Williams, Sai Roop Somaraju, Siddharth Chintamaneni


Taught by

Linux Plumbers Conference

Related Courses

Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
100+ Exercises - Advanced Python Programming
Udemy
230+ Exercises - Python for Data Science - NumPy + Pandas
Udemy
Don't Ruck Us Too Hard - Owning All of Ruckus AP Devices
nullcon via YouTube
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime
Black Hat via YouTube