Linux 'io_uring' security blindspot allows stealthy rootkit attacks
- ARMO researchers demonstrated a new proof-of-concept rootkit on Linux systems.
- This rootkit exploits the io_uring Linux kernel interface introduced in 2019.
- The io_uring interface handles operations including file and network actions.
- Google's 2023 testing found 60% of bypass submissions exploited io_uring.
- Named Curing, the rootkit evades detection by many common Linux runtime security tools.
13 Articles
13 Articles
Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor
An Israeli vendor was able to evade several leading Linux runtime security tools using a new proof-of-concept (PoC) rootkit that it claims reveals the limitations of many products in this space. The work of cloud and Kubernetes security company Armo, the PoC is called ‘Curing’, a portmanteau word that combines the idea of a ‘cure’ with the io_uring Linux kernel interface that the company used in its bypass PoC. Using Curing, Armo found it was p…
Clandestine rootkit compromise possible with Linux io_uring interface issue
Clandestine rootkit compromise possible with Linux io_uring interface issue Rootkit compromise on Linux systems could remain undetected through the exploitation of a security issue impacting the Linux kernel interface io…


Vigilance.fr - Linux kernel : buffer overflow via HFS+, analyzed on 25/02/25 – Global Security Mag Online
An attacker can trigger a buffer overflow of the Linux kernel, via HFS+, in order to trigger a denial of service, and possibly to run code. View online: https://vigilance.fr/vulnerability/...
New Linux Rootkit - Schneier on Security
Interesting: The company has released a working rootkit called “Curing” that uses io_uring, a feature built into the Linux kernel, to stealthily perform malicious activities without being caught by many of the detection solutions currently on the market. At the heart of the issue is the heavy reliance on monitoring system calls, which has become the go-to method for many cybersecurity vendors. The problem? Attackers can completely sidestep these…
Coverage Details
Bias Distribution
- 100% of the sources are Center
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage