Linux 'io_uring' security blindspot allows stealthy rootkit attacks
- ARMO researchers demonstrated a new proof-of-concept rootkit on Linux systems.
- This rootkit exploits the io_uring Linux kernel interface introduced in 2019.
- The io_uring interface handles operations including file and network actions.
- Google's 2023 testing found 60% of bypass submissions exploited io_uring.
- Named Curing, the rootkit evades detection by many common Linux runtime security tools.
14 Articles
14 Articles
Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor
An Israeli vendor was able to evade several leading Linux runtime security tools using a new proof-of-concept (PoC) rootkit that it claims reveals the limitations of many products in this space. The work of cloud and Kubernetes security company Armo, the PoC is called ‘Curing’, a portmanteau word that combines the idea of a ‘cure’ with the io_uring Linux kernel interface that the company used in its bypass PoC. Using Curing, Armo found it was p…
Clandestine rootkit compromise possible with Linux io_uring interface issue
Clandestine rootkit compromise possible with Linux io_uring interface issue Rootkit compromise on Linux systems could remain undetected through the exploitation of a security issue impacting the Linux kernel interface io…


Vigilance.fr - Linux kernel : buffer overflow via HFS+, analyzed on 25/02/25 – Global Security Mag Online
An attacker can trigger a buffer overflow of the Linux kernel, via HFS+, in order to trigger a denial of service, and possibly to run code. View online: https://vigilance.fr/vulnerability/...
Coverage Details
Bias Distribution
- 100% of the sources are Center
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage