Avatar photo
By: Marcus Meissner

December 18, 2023 4:08 pm

5,828 views

SUSE addresses the SSH v2 protocol Terrapin Attack aka CVE-2023-48795

Today, on December 18th 2023, researchers from the Ruhr University Bochum published a protocol flaw in the SSH v2 protocol, codenamed Terrapin Attack. The flaw allows removing encrypted SSH messages at the begin of the communication, allowing downgrade of some security aspects of SSH connections. The flaw does not allow injecting new traffic or commands. […]

Read More


Avatar photo
By: Marcus Meissner

September 20, 2023 2:30 pm

2,259 views

GO and FIPS 140-2 / 140-3 certified cryptography

The current FIPS 140-2 and ongoing FIPS 140-3 certification efforts by SUSE cover a wide range of system libraries and its users, and the Linux Kernel. One gap recently closed is the missing FIPS 140 support for applications written in the GO language. To allow building GO binaries with cryptography compliant to FIPS 140, SUSE […]

Read More


Avatar photo
By: Marcus Meissner

April 3, 2023 12:44 pm

3,516 views

SUSE Linux Enterprise and SBOM support

After recent supply chain attacks and with ever increasing security automation especially the software inventory management becomes more and more important. Governments and other regulated industries now require publishing a so called Software Bill Of Materials (SBOM) to software products. Various SBOM formats have appeared in the market. SUSE has started to publish SBOM in […]

Read More


Avatar photo
By: Marcus Meissner

September 15, 2022 2:14 pm

2,493 views

SUSE adds security automation support for Kernel Live Patches

SUSE has found that security automation is not handling SUSEs kernel livepatches very well. To understand the underlying problem and ways toward a solution, lets first look at the underlying concepts. Kernel Livepatching Kernel livepatching is a technology where functions within a running Linux kernel are patched to fix security issues, without rebooting or even […]

Read More


Avatar photo
By: Marcus Meissner

July 4, 2022 11:26 am

4,614 views

Applying DISA STIG hardening to SLES installations

Introduction The DISA and SUSE have authored a STIG (Secure Technical Implementation Guide) that describes how to harden a SUSE Linux Enterprise system. The STIG is a long list of rules, each containing description, detection of problems and how to remediate problems on a per rule basis. While originally STIGs are supposed to applied manually, […]

Read More


Avatar photo
By: Marcus Meissner

March 8, 2022 12:58 pm

5,868 views

SUSE statement on “Dirty Pipe” attack

On Monday, March 7th, security researcher Max Kellermann published a new software vulnerability that affect users of the Linux Kernel. The vulnerability, called Dirty Pipe (CVE-2022-0847) , impacts Linux Kernels 5.8 and later, and allows local attackers to overwrite files even if they had only read permissions, allowing for easy privilege escalation. The issue is […]

Read More


Avatar photo
By: Marcus Meissner

December 12, 2021 8:49 am

19,078 views

SUSE Statement on log4j / log4shell / CVE-2021-44228 / Vulnerability

On Friday December 10 morning a new exploit in "log4j" Java logging framework was reported, that can be trivially exploited. This vulnerability is caused by a new feature introduced in log4j 2.x versions where a specific string embedded in messages logged by log4j would be interpreted by log4j to connect to remote sites […]

Read More


Avatar photo
By: Marcus Meissner

March 2, 2021 6:03 pm

3,491 views

SUSE addresses another grub2 UEFI secure boot security exposure

Various security researchers and the grub2 team have published more security issues in grub2 today, which can be used to bypass the UEFI secure boot chain. These security issues have the same scope as the BootHole issues from 2020. This attack requires root access to the bootloader used in Linux operating systems, GRUB2. It bypasses […]

Read More


Avatar photo
By: Marcus Meissner

December 14, 2020 7:32 am

8,838 views

SUSE statement on Amnesia:33 vulnerabilities

Researchers from Forescout research labs have published a set of new software vulnerabilities that affect embedded TCP/IP stacks. The set of vulnerabilities, called AMNESIA:33, only affects small parts of the SUSE Linux Enterprise set of packages. The Linux Kernel TCP/IP implementation is not affected by these vulnerabilities, as it uses its own IP stack. The […]

Read More