article thumbnail

HCRootkit / Sutersu Linux Rootkit Analysis

Lacework

Jared Stroud, Tom Hegel Cloud Security Researchers – Lacework Labs Key Points Lacework Labs identified new samples and infrastructure associated with HCRootkit / Sutersu Linux rootkit activity, building-off its recent initial identification from our colleagues at Avast. These files compromise a host [.].

Linux 98
article thumbnail

CyRC Case Study: Exploitable memory corruption using CVE-2020-25669 and Linux Kernel

Synopsys

This in-depth analysis explores CVE-2020-25669, a vulnerability that exploited a memory corruption issue in Linux Kernel. The post CyRC Case Study: Exploitable memory corruption using CVE-2020-25669 and Linux Kernel appeared first on Application Security Blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

University of Minnesota Linux Ban Prompts Questions About Open Source

Toptal

Researchers snuck vulnerabilities past the peer-review process and into the open-source Linux kernel codebase. What does this mean for the ubiquitous Linux kernel, and open source in general?

article thumbnail

The Linux Foundation Throws Weight Behind Secure Microkernel

DevOps.com

The Linux Foundation announced today it will host the seL4 Foundation, the nonprofit organization established by Data61, an arm of Commonwealth Scientific and Industrial Research Organization (CSIRO) in Australia that has been developing the seL4 microkernel operating system.

Linux 111
article thumbnail

Native Java Debugging on Alpine Linux: GDB, OpenJDK and the Mysterious Unknown Signal

OverOps

Porting a software project to a new operating system is always interesting and fun, and Alpine Linux with its musl libc brings a unique set of challenges. A while ago, I was tasked with porting OverOps’ native agent to Alpine Linux. LLDB on Alpine Linux. Even getting GDB up and running proved to be a major challenge!

Linux 247
article thumbnail

ELF of the Month: Linux DDoS Malware Sample

Lacework

James CondonDirector of Research, Lacework Labs Each month we take a look at a malicious Executable and Linkable Format (ELF) file, the common executable file format for Unix and Unix-like Operating Systems, and share details about the sample. In this edition of ELF of the Month, we take a look at a Linux DDoS sample […]

Linux 52
article thumbnail

CVE-2022-47939: Critical RCE Vulnerability in Linux Kernel

Tenable

CVE-2022-47939: Critical RCE Vulnerability in Linux Kernel A critical remote code execution vulnerability in the Linux kernel has been publicly disclosed by Trend Micro's Zero Day Initiative in its ZDI-22-1690 advisory. ZDI disclosed the vulnerability to the Linux team in July 2022, and was patched on August 17 in the 5.15.61

Linux 54