By: Marcus Meissner

April 3, 2023 12:44 pm

1,698 views

SUSE Linux Enterprise and SBOM support

After recent supply chain attacks and with ever increasing security automation especially the software inventory management becomes more and more important. Governments and other regulated industries now require publishing a so called Software Bill Of Materials (SBOM) to software products. Various SBOM formats have appeared in the market. SUSE has started to publish SBOM in […]

Read More



By: Marcus Meissner

September 15, 2022 2:14 pm

1,608 views

SUSE adds security automation support for Kernel Live Patches

SUSE has found that security automation is not handling SUSEs kernel livepatches very well. To understand the underlying problem and ways toward a solution, lets first look at the underlying concepts. Kernel Livepatching Kernel livepatching is a technology where functions within a running Linux kernel are patched to fix security issues, without rebooting or even […]

Read More



By: Marcus Meissner

July 4, 2022 11:26 am

2,378 views

Applying DISA STIG hardening to SLES installations

Introduction The DISA and SUSE have authored a STIG (Secure Technical Implementation Guide) that describes how to harden a SUSE Linux Enterprise system. The STIG is a long list of rules, each containing description, detection of problems and how to remediate problems on a per rule basis. While originally STIGs are supposed to applied manually, […]

Read More



By: Marcus Meissner

March 8, 2022 12:58 pm

4,790 views

SUSE statement on “Dirty Pipe” attack

On Monday, March 7th, security researcher Max Kellermann published a new software vulnerability that affect users of the Linux Kernel. The vulnerability, called Dirty Pipe (CVE-2022-0847) , impacts Linux Kernels 5.8 and later, and allows local attackers to overwrite files even if they had only read permissions, allowing for easy privilege escalation. The issue is […]

Read More



By: Marcus Meissner

December 12, 2021 8:49 am

17,083 views

SUSE Statement on log4j / log4shell / CVE-2021-44228 / Vulnerability

On Friday December 10 morning a new exploit in "log4j" Java logging framework was reported, that can be trivially exploited. This vulnerability is caused by a new feature introduced in log4j 2.x versions where a specific string embedded in messages logged by log4j would be interpreted by log4j to connect to remote sites […]

Read More



By: Marcus Meissner

March 2, 2021 6:03 pm

2,712 views

SUSE addresses another grub2 UEFI secure boot security exposure

Various security researchers and the grub2 team have published more security issues in grub2 today, which can be used to bypass the UEFI secure boot chain. These security issues have the same scope as the BootHole issues from 2020. This attack requires root access to the bootloader used in Linux operating systems, GRUB2. It bypasses […]

Read More



By: Marcus Meissner

December 14, 2020 7:32 am

8,012 views

SUSE statement on Amnesia:33 vulnerabilities

Researchers from Forescout research labs have published a set of new software vulnerabilities that affect embedded TCP/IP stacks. The set of vulnerabilities, called AMNESIA:33, only affects small parts of the SUSE Linux Enterprise set of packages. The Linux Kernel TCP/IP implementation is not affected by these vulnerabilities, as it uses its own IP stack. The […]

Read More



By: Marcus Meissner

November 16, 2020 11:48 am

2,842 views

SUSE Releases Fix for SADDNS Vulnerability

Security researchers from University of California and Tsinghua University have identified a new variant of DNS cache poisoning attacks called SADDNS ("Side-channel AttackeD DNS") due to newly identified side channel attack against ICMP replies. This reappearance of the DNS cache poisoning attack allows remote attackers to pretend to be different hosts, if your […]

Read More



By: Marcus Meissner

November 10, 2020 6:31 pm

3,152 views

SUSE releases fixes for new PLATYPUS attack

Today security researchers from TU Graz have published a new side-channel information leak attack using power metering in modern Intel CPUs. With this side-channel attack on power consumption fluctuations it is possible to extract secret information on the same CPU, like for instance key material from SGX enclaves or the Linux kernel, or KASLR information […]

Read More


[ajax_load_more author="377" offset="10"]