Skip to content(if available)orjump to list(if available)

io_uring based rootkit can bypass syscall-focused Linux security tools

arghwhat

The title is somewhat misleading, as it suggests an io_uring issue when there is none - it's just that anti-virus solutions like Microsoft Defender try to monitor syscalls but don't monitor io_uring.

They're far from guaranteed to catch things they monitor anyway, and I feel they mostly just exist to let enterprise pretend they care about security by buying ineffective band aids and duct tape. I guess a legal defense is more important than a technical one.

StressedDev

You are right that this is not an io_uring issue.

  I think you under estimate the value of anti-virus.  Anti virus software is a good second line of defense.  It’s not perfect but it will stop a lot of known malware.  This has value.

the8472

Security software can have negative value when it increases attack surface[0], shuts down infrastructure[1], impedes productivity or pushes users towards workarounds that make things overall less secure.

[0] page 11 https://services.google.com/fh/files/misc/m-trends-2025-en.p... [1] https://news.ycombinator.com/item?id=41002195

arghwhat

I wouldn't consider it a second line of defense - as a rule of thumb, it will only catch old and overused attack vectors, and rarely well.

Anything novel will fly right past it, and it will have false positives. Plastering ineffective or mildly effective security everywhere in the name of "defense in depth" can have negative value as it reduces diligence in applying more relevant security measures that aren't just a random package install.

nicce

It like the last line of defence. If you are lucky, it helps.

wmf

These security tools need to block any system call they don't recognize (fail closed). Obviously this breaks some apps but the alternative is huge security holes.

jmclnx

Seems to go back to the old pick 2 of these for your system:

* fast

* secure

* easy