<p>➀ Io_uring was introduced in 2019 to improve the efficiency and flexibility of input and output operations on Linux, but it also created critical blind spots for Linux security tools.</p><p>➁ Security researchers have discovered that io_uring operations can completely evade conventional system call monitoring, leading to undetectable activities.</p><p>➂ A rootkit called Curing was built to exploit this vulnerability, which can execute commands, read files, and interact with the network without detectable system calls.</p>
Related Articles
- Alarming ASUS Armoury Crate Vulnerability Can Give Hackers Admin Accessabout 2 months ago
- Intel engineer's Linux patch would alert users of outdated microcode — Flagging the system as vulnerable9 months ago
- Microsoft will end Windows 10 support in exactly one year10 months ago
- Intel's fabled Itanium refuses to die, but the end is probably near — deprecation of IA-64 support is back on the chopping block in GCC version 164 days ago
- US DoJ Probes Ex-Ransomware Negotiator Over Alleged Extortion Kickbacksabout 1 month ago
- How to add non-Steam games to your Steam Deck with Heroic Games Launcherabout 2 months ago
- Steam OS as a desktop? I used the Legion Go S as my work PCabout 2 months ago
- Should You Click 'Unsubscribe' On Unwanted Emails? Security Experts Weigh In2 months ago
- How to rip your audio CDs to MP3, FLAC from the Linux terminal with abcde2 months ago
- Boot Up in Style — Design Your Own GRUB Menu for Linux2 months ago