Researchers investigate executable stack issues in Linux systems

At the NDSS 2025 conference, Hengkai Ye and Hong Hu from The Pennsylvania State University presented a paper on subtle vulnerabilities in Linux systems that reintroduce executable stacks. Their work highlights how developers, including security experts, accidentally disable protections against code injection attacks. The study examines tools and system components to reveal gaps in enforcing write-xor-execute policies.

The paper, titled 'Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems,' was delivered in Session 6D on Software Security: Vulnerability Detection during the Network and Distributed System Security Symposium (NDSS) 2025. Historically, code injection via buffer overflows was a common attack vector, but the adoption of write-xor-execute (W^X) protections largely prevented writable-and-executable memory, mitigating such threats.

Despite these advancements, the researchers identified recurring instances where software developers inadvertently disable W^X, restoring executable stacks in popular applications. Each case has been patched, yet the pattern persists in modern development. To explore this, Ye and Hu conducted two key investigations. First, they evaluated program-hardening tools, finding that even experienced security developers often miss critical steps to prevent executable stacks. Notably, 11 tools implemented as inlined reference monitors (IRMs) introduced executable stacks into all 'hardened' applications.

Second, the study analyzed W^X enforcement across Linux's compilation toolchain, kernel, and loader. This process demands tight coordination among multiple components, forming a complex chain of trust for stack protection. A frequent oversight occurs when developers, including security researchers, neglect the GNU-stack section in assembly code, unintentionally enabling executable stacks.

The findings outline potential attacker exploitation paths and offer mitigation recommendations to strengthen Linux security practices. NDSS, which promotes practical advancements in network and distributed system security, hosted the presentation to foster better implementation of security technologies.

Verwandte Artikel

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Bild generiert von KI

Russian hackers use Linux VMs to hide malware on Windows

Von KI berichtet Bild generiert von KI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Cyble Research and Intelligence Labs has revealed ShadowHS, a sophisticated fileless framework for post-exploitation on Linux systems. The tool enables stealthy, in-memory operations and long-term access for attackers. It features a weaponized version of hackshell and advanced evasion techniques.

Von KI berichtet

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Von KI berichtet

A security researcher has found that bugs in the Linux kernel often remain undetected for more than two years on average, with some persisting for over two decades. By analyzing 20 years of kernel development, Jenny Guanni Qu uncovered how these flaws quietly affect cloud systems, enterprises, and billions of devices. Her work highlights the challenges of maintaining secure open-source software.

A critical remote code execution vulnerability has been discovered in multiple BeyondTrust products. The flaw, rated 9.9 out of 10 in severity, allows hackers to run code on affected systems without needing to log in. The issue was reported on February 10, 2026.

Von KI berichtet

Building on initial reports of the proposed runtime standby ABI for Linux—inspired by Windows' Modern Standby—a detailed eight-patch series has been posted to the kernel mailing list by Antheas Kapenekakis. Targeting x86 ACPI systems, it enables low-power 'asleep' appearances while keeping essential services active, promising better battery life for laptops, handhelds, and more.

Freitag, 06. März 2026, 04:23 Uhr

Linux rootkits advance with eBPF and io_uring techniques

Donnerstag, 19. Februar 2026, 13:36 Uhr

Researchers uncover new SysUpdate malware variant targeting Linux

Donnerstag, 05. Februar 2026, 15:05 Uhr

Critical flaws discovered in n8n workflow tool

Samstag, 17. Januar 2026, 16:30 Uhr

GNU C Library fixes security issue from 1996

Donnerstag, 08. Januar 2026, 08:48 Uhr

The myth of Linux's invincibility in enterprise security

Donnerstag, 08. Januar 2026, 07:13 Uhr

Study uncovers long-hidden bugs in Linux kernel

Mittwoch, 31. Dezember 2025, 02:21 Uhr

Linux developers call for d-bus overhaul

Samstag, 13. Dezember 2025, 23:54 Uhr

China-nexus groups and cybercriminals ramp up React2Shell exploits

Samstag, 13. Dezember 2025, 19:38 Uhr

Linux kernel Rust adoption: Benchmarks, challenges, and next steps

Mittwoch, 10. Dezember 2025, 07:11 Uhr

North Korean hackers exploit maximum severity React2Shell flaw

 

 

 

Diese Website verwendet Cookies

Wir verwenden Cookies für Analysen, um unsere Website zu verbessern. Lesen Sie unsere Datenschutzrichtlinie für weitere Informationen.
Ablehnen