{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SLE 11 SERVER Unsupported Extras","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 11 SP1 LTSS","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2014-9585","url":"https://www.cve.org/CVERecord?id=CVE-2014-9585"},{"name":"CVE-2013-4299","url":"https://www.cve.org/CVERecord?id=CVE-2013-4299"},{"name":"CVE-2014-7842","url":"https://www.cve.org/CVERecord?id=CVE-2014-7842"},{"name":"CVE-2014-3673","url":"https://www.cve.org/CVERecord?id=CVE-2014-3673"},{"name":"CVE-2012-6657","url":"https://www.cve.org/CVERecord?id=CVE-2012-6657"},{"name":"CVE-2014-7841","url":"https://www.cve.org/CVERecord?id=CVE-2014-7841"},{"name":"CVE-2014-3687","url":"https://www.cve.org/CVERecord?id=CVE-2014-3687"},{"name":"CVE-2014-8709","url":"https://www.cve.org/CVERecord?id=CVE-2014-8709"},{"name":"CVE-2014-8160","url":"https://www.cve.org/CVERecord?id=CVE-2014-8160"},{"name":"CVE-2014-3185","url":"https://www.cve.org/CVERecord?id=CVE-2014-3185"},{"name":"CVE-2014-9420","url":"https://www.cve.org/CVERecord?id=CVE-2014-9420"},{"name":"CVE-2013-7263","url":"https://www.cve.org/CVERecord?id=CVE-2013-7263"},{"name":"CVE-2014-9584","url":"https://www.cve.org/CVERecord?id=CVE-2014-9584"},{"name":"CVE-2014-0181","url":"https://www.cve.org/CVERecord?id=CVE-2014-0181"},{"name":"CVE-2014-3184","url":"https://www.cve.org/CVERecord?id=CVE-2014-3184"},{"name":"CVE-2014-3688","url":"https://www.cve.org/CVERecord?id=CVE-2014-3688"},{"name":"CVE-2010-5313","url":"https://www.cve.org/CVERecord?id=CVE-2010-5313"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Suse SUSE-SU-2015:0652-1 du 01 avril    2015","url":"https://www.suse.com/support/update/announcement/2015/suse-su-20150652-1.html"}],"reference":"CERTFR-2015-AVI-165","revisions":[{"description":"version initiale.","revision_date":"2015-04-15T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"D\u00e9ni de service"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau Linux de\n<span class=\"textit\">Suse</span>. Certaines d'entre elles permettent \u00e0\nun attaquant de provoquer un d\u00e9ni de service \u00e0 distance, un d\u00e9ni de\nservice et un contournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Suse","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Suse SUSE-SU-2015:0652-1 du 01 avril 2015","url":null}]}
