Overflowing the Kernel Stack with BPF - Security Implications and Mitigations
Offered By: Linux Plumbers Conference via YouTube
Course Description
Overview
Explore the critical security implications of eBPF's interaction with the kernel stack in this 23-minute conference talk from the Linux Plumbers Conference. Delve into two fundamental problems in the BPF runtime environment that allow kernel stack overflow. Examine how BPF programs can inherit limited kernel stack space and potentially exceed it, despite verifier checks. Investigate the incomplete restrictions on BPF program nesting, leading to stack exhaustion. Learn about BPF program attachment, stack interactions, and known difficulties with limited kernel stacks. Witness demonstrations of stack overflow scenarios and discuss mitigation strategies for these and future issues arising from implicit verifier assumptions about the runtime execution environment.
Syllabus
Overflowing the kernel stack with BPF - Dan Williams, Sai Roop Somaraju, Siddharth Chintamaneni
Taught by
Linux Plumbers Conference
Related Courses
Ultimate Ethical Hacking and Penetration Testing (UEH)Udemy 100+ Exercises - Advanced Python Programming
Udemy 230+ Exercises - Python for Data Science - NumPy + Pandas
Udemy Don't Ruck Us Too Hard - Owning All of Ruckus AP Devices
nullcon via YouTube Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime
Black Hat via YouTube