{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<P>Google Android (Nexus) toutes versions n'int\u00e9grant pas le  correctif de s\u00e9curit\u00e9 du 2 mai 2016</P>","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-2458","url":"https://www.cve.org/CVERecord?id=CVE-2016-2458"},{"name":"CVE-2016-2449","url":"https://www.cve.org/CVERecord?id=CVE-2016-2449"},{"name":"CVE-2016-2462","url":"https://www.cve.org/CVERecord?id=CVE-2016-2462"},{"name":"CVE-2016-2429","url":"https://www.cve.org/CVERecord?id=CVE-2016-2429"},{"name":"CVE-2016-2448","url":"https://www.cve.org/CVERecord?id=CVE-2016-2448"},{"name":"CVE-2016-2452","url":"https://www.cve.org/CVERecord?id=CVE-2016-2452"},{"name":"CVE-2016-2457","url":"https://www.cve.org/CVERecord?id=CVE-2016-2457"},{"name":"CVE-2016-2460","url":"https://www.cve.org/CVERecord?id=CVE-2016-2460"},{"name":"CVE-2016-2431","url":"https://www.cve.org/CVERecord?id=CVE-2016-2431"},{"name":"CVE-2016-2428","url":"https://www.cve.org/CVERecord?id=CVE-2016-2428"},{"name":"CVE-2016-2445","url":"https://www.cve.org/CVERecord?id=CVE-2016-2445"},{"name":"CVE-2016-2432","url":"https://www.cve.org/CVERecord?id=CVE-2016-2432"},{"name":"CVE-2016-2450","url":"https://www.cve.org/CVERecord?id=CVE-2016-2450"},{"name":"CVE-2016-2454","url":"https://www.cve.org/CVERecord?id=CVE-2016-2454"},{"name":"CVE-2016-2439","url":"https://www.cve.org/CVERecord?id=CVE-2016-2439"},{"name":"CVE-2015-0570","url":"https://www.cve.org/CVERecord?id=CVE-2015-0570"},{"name":"CVE-2016-2451","url":"https://www.cve.org/CVERecord?id=CVE-2016-2451"},{"name":"CVE-2016-2459","url":"https://www.cve.org/CVERecord?id=CVE-2016-2459"},{"name":"CVE-2016-0774","url":"https://www.cve.org/CVERecord?id=CVE-2016-0774"},{"name":"CVE-2016-2435","url":"https://www.cve.org/CVERecord?id=CVE-2016-2435"},{"name":"CVE-2016-2446","url":"https://www.cve.org/CVERecord?id=CVE-2016-2446"},{"name":"CVE-2015-0571","url":"https://www.cve.org/CVERecord?id=CVE-2015-0571"},{"name":"CVE-2016-2453","url":"https://www.cve.org/CVERecord?id=CVE-2016-2453"},{"name":"CVE-2016-2447","url":"https://www.cve.org/CVERecord?id=CVE-2016-2447"},{"name":"CVE-2015-0569","url":"https://www.cve.org/CVERecord?id=CVE-2015-0569"},{"name":"CVE-2016-2461","url":"https://www.cve.org/CVERecord?id=CVE-2016-2461"},{"name":"CVE-2016-2060","url":"https://www.cve.org/CVERecord?id=CVE-2016-2060"},{"name":"CVE-2016-2441","url":"https://www.cve.org/CVERecord?id=CVE-2016-2441"},{"name":"CVE-2016-2456","url":"https://www.cve.org/CVERecord?id=CVE-2016-2456"},{"name":"CVE-2016-2437","url":"https://www.cve.org/CVERecord?id=CVE-2016-2437"},{"name":"CVE-2016-2430","url":"https://www.cve.org/CVERecord?id=CVE-2016-2430"},{"name":"CVE-2016-2444","url":"https://www.cve.org/CVERecord?id=CVE-2016-2444"},{"name":"CVE-2016-2434","url":"https://www.cve.org/CVERecord?id=CVE-2016-2434"},{"name":"CVE-2016-2442","url":"https://www.cve.org/CVERecord?id=CVE-2016-2442"},{"name":"CVE-2016-2438","url":"https://www.cve.org/CVERecord?id=CVE-2016-2438"},{"name":"CVE-2016-2436","url":"https://www.cve.org/CVERecord?id=CVE-2016-2436"},{"name":"CVE-2015-1805","url":"https://www.cve.org/CVERecord?id=CVE-2015-1805"},{"name":"CVE-2016-2443","url":"https://www.cve.org/CVERecord?id=CVE-2016-2443"},{"name":"CVE-2016-0705","url":"https://www.cve.org/CVERecord?id=CVE-2016-0705"},{"name":"CVE-2016-2440","url":"https://www.cve.org/CVERecord?id=CVE-2016-2440"}],"links":[],"reference":"CERTFR-2016-AVI-149","revisions":[{"description":"version initiale.","revision_date":"2016-05-03T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Google Android (Nexus)</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Google Android (Nexus)","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Android du 02 mai 2016","url":"http://source.android.com/security/bulletin/2016-05-01.html"}]}
