Researchers investigate executable stack issues in Linux systems

At the NDSS 2025 conference, Hengkai Ye and Hong Hu from The Pennsylvania State University presented a paper on subtle vulnerabilities in Linux systems that reintroduce executable stacks. Their work highlights how developers, including security experts, accidentally disable protections against code injection attacks. The study examines tools and system components to reveal gaps in enforcing write-xor-execute policies.

The paper, titled 'Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems,' was delivered in Session 6D on Software Security: Vulnerability Detection during the Network and Distributed System Security Symposium (NDSS) 2025. Historically, code injection via buffer overflows was a common attack vector, but the adoption of write-xor-execute (W^X) protections largely prevented writable-and-executable memory, mitigating such threats.

Despite these advancements, the researchers identified recurring instances where software developers inadvertently disable W^X, restoring executable stacks in popular applications. Each case has been patched, yet the pattern persists in modern development. To explore this, Ye and Hu conducted two key investigations. First, they evaluated program-hardening tools, finding that even experienced security developers often miss critical steps to prevent executable stacks. Notably, 11 tools implemented as inlined reference monitors (IRMs) introduced executable stacks into all 'hardened' applications.

Second, the study analyzed W^X enforcement across Linux's compilation toolchain, kernel, and loader. This process demands tight coordination among multiple components, forming a complex chain of trust for stack protection. A frequent oversight occurs when developers, including security researchers, neglect the GNU-stack section in assembly code, unintentionally enabling executable stacks.

The findings outline potential attacker exploitation paths and offer mitigation recommendations to strengthen Linux security practices. NDSS, which promotes practical advancements in network and distributed system security, hosted the presentation to foster better implementation of security technologies.

Related Articles

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Image generated by AI

Russian hackers use Linux VMs to hide malware on Windows

Reported by AI Image generated by AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Cyble Research and Intelligence Labs has revealed ShadowHS, a sophisticated fileless framework for post-exploitation on Linux systems. The tool enables stealthy, in-memory operations and long-term access for attackers. It features a weaponized version of hackshell and advanced evasion techniques.

Reported by AI

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Reported by AI

A security researcher has found that bugs in the Linux kernel often remain undetected for more than two years on average, with some persisting for over two decades. By analyzing 20 years of kernel development, Jenny Guanni Qu uncovered how these flaws quietly affect cloud systems, enterprises, and billions of devices. Her work highlights the challenges of maintaining secure open-source software.

A critical remote code execution vulnerability has been discovered in multiple BeyondTrust products. The flaw, rated 9.9 out of 10 in severity, allows hackers to run code on affected systems without needing to log in. The issue was reported on February 10, 2026.

Reported by AI

Building on initial reports of the proposed runtime standby ABI for Linux—inspired by Windows' Modern Standby—a detailed eight-patch series has been posted to the kernel mailing list by Antheas Kapenekakis. Targeting x86 ACPI systems, it enables low-power 'asleep' appearances while keeping essential services active, promising better battery life for laptops, handhelds, and more.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline