Herald ten Dam wrote:
>....In paragraph 2.9.9 it stated: "Starting with the 2.6.x
>kernel releases, Linux offers Address Space Layout
>Randomization (ASLR) and the No-eXecute (NX bit) for
>mitigation of buffer overflow attacks." So possibly it
>is in sles11, but certaintly in sles12.

That statement is generic and varies by architecture. For example, KASLR 
(Kernel Address Space Layout Randomization) on s390x architecture debuted 
in Linux kernel 5.2. Linux distributors pretty routinely backport new 
features to earlier kernel release levels, and it looks like SUSE has done 
that for KASLR on s390x with SUSE 15 SP1 at least. Mark Post probably has 
more details how far back it goes, but I wouldn't assume any SLES 12 or 
prior.

Back to Victor's original question for a moment:

>Does anyone knows is under z/Linux, SUSE, exist a feature
>to protect from buffer overflow attacks?

Yes, please have a look at Secure Execution for Linux and IBM Hyper 
Protect Virtual Servers (with Secure Build) as critical security enablers 
for this class of issues and others. For example, SUSE introduced support 
for Secure Execution for Linux with SLES 15 SP2. A few more details are 
available on SUSE's blog here:

https://www.suse.com/c/security-at-the-core-suse-support-for-the-new-ibm-z15-and-linuxone/

SUSE released SLES 15 SP2 in July, 2020.

- - - - - - - - - -
Timothy Sipples
I.T. Architect Executive
Digital Asset & Other Industry Solutions
IBM Z & LinuxONE
- - - - - - - - - -
E-Mail: sipp...@sg.ibm.com

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to lists...@vm.marist.edu with the message: INFO LINUX-390 or visit
http://www2.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to