This week we talk about the dual use purposes of eBPF - both for security and for exploitation, and how you can keep your systems safe, plus we cover security updates for the Linux kernel, Ruby, SciPy, YAJL, ConnMan, curl and more.
80 unique CVEs addressed
io_uring
x*
as punycode names always start with xn--
/sys/kernel/debug/tracing/uprobe_events
but once done, allows to then
have a BPF program executed every time the specified function within a
specified library / binary is executed - so by hooking libpam can then log the
credentials used by any user when logging in / authenticating for sudo etc.LD_PRELOAD
to hook into
the functions - but this requires that binaries get executed with this
environment set so is harder to achieve.text
section) to look for breakpoint opcode (0xCC
) or
it could look for the special memory mapping [uprobes]
in /proc/self/maps
/sys/kernel/debug/tracing/uprobe_events
-
which lists all the uretprobes currently in use on the system