11 comments

  • arghwhat a day ago

    The title is somewhat misleading, as it suggests an io_uring issue when there is none - it's just that anti-virus solutions like Microsoft Defender try to monitor syscalls but don't monitor io_uring.

    They're far from guaranteed to catch things they monitor anyway, and I feel they mostly just exist to let enterprise pretend they care about security by buying ineffective band aids and duct tape. I guess a legal defense is more important than a technical one.

    • StressedDev a day ago

      You are right that this is not an io_uring issue.

        I think you under estimate the value of anti-virus.  Anti virus software is a good second line of defense.  It’s not perfect but it will stop a lot of known malware.  This has value.
      • the8472 a day ago

        Security software can have negative value when it increases attack surface[0], shuts down infrastructure[1], impedes productivity or pushes users towards workarounds that make things overall less secure.

        [0] page 11 https://services.google.com/fh/files/misc/m-trends-2025-en.p... [1] https://news.ycombinator.com/item?id=41002195

      • arghwhat a day ago

        I wouldn't consider it a second line of defense - as a rule of thumb, it will only catch old and overused attack vectors, and rarely well.

        Anything novel will fly right past it, and it will have false positives. Plastering ineffective or mildly effective security everywhere in the name of "defense in depth" can have negative value as it reduces diligence in applying more relevant security measures that aren't just a random package install.

        • dallbee 16 hours ago

          I cannot upvote this hard enough.

          I see this all the time with VPNs. By having everything behind the company VPN, application security isn't taken as seriously. As a result, lateral access becomes trivial at these companies.

          Keeping everything public internet exposed from the start actually results in better security.

        • nicce a day ago

          It like the last line of defence. If you are lucky, it helps.

  • PeterWhittaker 8 hours ago

    This isn't a "bypass" (and it certainly isn't "terrifying", as reported on /. and elsewhere).

    1. The program can only do what it is permitted to do: io_uring just reduces the number of system calls required - but since it works on file descriptors, you must have already acquired the fd in the correct mode.

    2. Some monitoring systems hook into system calls and report when they are used: io_uring and opcodes mean the program can perform actions without being noticed by these programs...

    3. ...which can report on the use of the system calls that set up io_uring access...

    4. ...and could report on the resuting I/O by other means.

    I won’t go so far as to say this is a nothing burger, but it feels close.

  • wmf a day ago

    These security tools need to block any system call they don't recognize (fail closed). Obviously this breaks some apps but the alternative is huge security holes.

    • hellow0rld123 12 hours ago

      Maybe not blocking, but the problem is that they rely on system calls for visability for system events and that's the problem because we have mechanisms like io_uring which can allow attackers to so certain actions without making any system calls.

      • wmf 4 hours ago

        io_uring is a system call. Security tools could analyze it but they don't because they haven't been updated.

  • jmclnx a day ago

    Seems to go back to the old pick 2 of these for your system:

    * fast

    * secure

    * easy