{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Ubuntu 16.04 LTS","product":{"name":"Ubuntu","vendor":{"name":"Ubuntu","scada":false}}},{"description":"Ubuntu 16.04 LTS ex\u00e9cut\u00e9 par un processeur Qualcomm Snapdragon","product":{"name":"Ubuntu","vendor":{"name":"Ubuntu","scada":false}}},{"description":"Ubuntu 14.04 LTS","product":{"name":"Ubuntu","vendor":{"name":"Ubuntu","scada":false}}},{"description":"Ubuntu 16.04 LTS pour Raspberry Pi 2","product":{"name":"Ubuntu","vendor":{"name":"Ubuntu","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-2186","url":"https://www.cve.org/CVERecord?id=CVE-2016-2186"},{"name":"CVE-2016-3138","url":"https://www.cve.org/CVERecord?id=CVE-2016-3138"},{"name":"CVE-2016-3955","url":"https://www.cve.org/CVERecord?id=CVE-2016-3955"},{"name":"CVE-2016-2847","url":"https://www.cve.org/CVERecord?id=CVE-2016-2847"},{"name":"CVE-2016-4557","url":"https://www.cve.org/CVERecord?id=CVE-2016-4557"},{"name":"CVE-2016-2185","url":"https://www.cve.org/CVERecord?id=CVE-2016-2185"},{"name":"CVE-2016-3136","url":"https://www.cve.org/CVERecord?id=CVE-2016-3136"},{"name":"CVE-2016-3140","url":"https://www.cve.org/CVERecord?id=CVE-2016-3140"},{"name":"CVE-2016-3672","url":"https://www.cve.org/CVERecord?id=CVE-2016-3672"},{"name":"CVE-2016-3951","url":"https://www.cve.org/CVERecord?id=CVE-2016-3951"},{"name":"CVE-2016-2184","url":"https://www.cve.org/CVERecord?id=CVE-2016-2184"},{"name":"CVE-2016-2188","url":"https://www.cve.org/CVERecord?id=CVE-2016-2188"},{"name":"CVE-2016-3137","url":"https://www.cve.org/CVERecord?id=CVE-2016-3137"},{"name":"CVE-2016-3157","url":"https://www.cve.org/CVERecord?id=CVE-2016-3157"},{"name":"CVE-2016-3689","url":"https://www.cve.org/CVERecord?id=CVE-2016-3689"},{"name":"CVE-2016-3156","url":"https://www.cve.org/CVERecord?id=CVE-2016-3156"}],"links":[],"reference":"CERTFR-2016-AVI-156","revisions":[{"description":"version initiale.","revision_date":"2016-05-09T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"D\u00e9ni de service"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">le noyau Linux d'Ubuntu</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service et un contournement de la politique de\ns\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d'Ubuntu","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2965-3 du 06 mai 2016","url":"http://www.ubuntu.com/usn/usn-2965-3/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2965-2 du 06 mai 2016","url":"http://www.ubuntu.com/usn/usn-2965-2/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2965-4 du 06 mai 2016","url":"http://www.ubuntu.com/usn/usn-2965-4/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2965-1 du 06 mai 2016","url":"http://www.ubuntu.com/usn/usn-2965-1/"}]}
