By: Marcus Meissner

June 24, 2019 10:14 am

920 views

Removal of IBRS mitigation for Spectre Variant2

As the Meltdown and Spectre attacks were published begin of January 2018, several mitigations were planned and implemented for Spectre Variant 2. What is Spectre Variant2? Spectre Variant 2 describes an issue where the CPUs branch prediction can be poisoned, so the CPU speculatively executes code it usually would never try to. For instance userspace […]

Read More



By: Marcus Meissner

June 18, 2019 1:43 pm

868 views

SUSE address the SACK panic tcp remote denial of service attacks

The page has changed due to adjustments to a new location: SUSE addresses the “SACK Panic” TCP remote denial of service attacks[…]

Read More



By: Marcus Meissner

June 17, 2019 12:40 pm

2,293 views

SUSE addresses the “SACK Panic” TCP remote denial of service attacks

Security researchers from Netflix have identified three new remote denial of service attacks against the Linux TCP stack. These can be all exploited remotely as soon as a TCP port is open to the public in default settings. There are three distinct issues: CVE-2019-11477: Also known as "SACK Panic". A integer overflow when SACK […]

Read More



By: Marcus Meissner

May 13, 2019 3:08 pm

3,806 views

SUSE addresses Microarchitectural Data Sampling Vulnerabilities

Researchers have identified new CPU side channel information leak attacks against various microarchitectural buffers used in Intel CPUs. These attacks allows local attackers to execute code to read out portions of recently read or written data by using speculative execution. Local attackers can be on the same OS or running code on the same thread […]

Read More



By: Marcus Meissner

January 10, 2019 3:25 pm

2,012 views

Stack clashing systemd aka “System Down”

One and a half year ago the security research company Qualys reported a new attack class against common operating systems called "Stack Clash". We documented this in our TID 7020973. The core security problem is that variable sized stack allocations could be used to overwrite heap memory as stack and heap grow towards each […]

Read More



By: Marcus Meissner

November 26, 2018 2:29 pm

1,670 views

Overview of Meltdown and Spectre CPU issues

Meltdown and Spectre - current overview The out-of-order execution features of processors, together with speculated execution and lacking permission checking recently lead to new two major classes of side channel attacks that could leak privileged information. The core issue is that some side effects of out-of-order execution are not being rolled back fully when the […]

Read More



By: Marcus Meissner

August 6, 2018 5:00 pm

5,986 views

SUSE addresses “SegmentSmack” attack

Today, on August 6th 2018, researchers from FICORA have published a remote denial of service attack against Linux Servers, called "SegmentSmack" (CVE-2018-5390). Due to inefficient programming remote attackers could use a lot of compute resources by exploiting worst-case behaviour in the TCP segment reassembly code of newer Linux Kernels, which could allow even single […]

Read More



By: Marcus Meissner

May 21, 2018 9:00 pm

15,226 views

SUSE Addresses Spectre Variant 4

Today, the Google Project Zero team disclosed an additional speculative execution method to obtain data that would otherwise be protected by the CPU. Google, together with CPU, hardware and operating system vendors have worked over the past months to prepare mitigations for this vulnerability, known as Spectre v4. The vulnerability is similar to others in […]

Read More



By: Marcus Meissner

September 5, 2017 8:33 pm

1,893 views

Our CVE Pages – self help to security issues in SUSE Linux Enterprise

SUSE CVE Pages SUSE offers various self-service options for getting information on Security Issues. One of these self-service options that are intended for human consumption are our CVE Pages. For every CVE that might be related to our products we provide a webpage with our current status. These pages cover SUSE Enterprise products, and also […]

Read More