{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SUSE Linux Enterprise Real Time Extension 11-SP4","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Debuginfo 11-SP4","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-5829","url":"https://www.cve.org/CVERecord?id=CVE-2016-5829"},{"name":"CVE-2016-4578","url":"https://www.cve.org/CVERecord?id=CVE-2016-4578"},{"name":"CVE-2016-4997","url":"https://www.cve.org/CVERecord?id=CVE-2016-4997"},{"name":"CVE-2016-4805","url":"https://www.cve.org/CVERecord?id=CVE-2016-4805"},{"name":"CVE-2016-4470","url":"https://www.cve.org/CVERecord?id=CVE-2016-4470"},{"name":"CVE-2015-7833","url":"https://www.cve.org/CVERecord?id=CVE-2015-7833"},{"name":"CVE-2016-4485","url":"https://www.cve.org/CVERecord?id=CVE-2016-4485"},{"name":"CVE-2016-1583","url":"https://www.cve.org/CVERecord?id=CVE-2016-1583"},{"name":"CVE-2016-5244","url":"https://www.cve.org/CVERecord?id=CVE-2016-5244"},{"name":"CVE-2016-4486","url":"https://www.cve.org/CVERecord?id=CVE-2016-4486"},{"name":"CVE-2016-0758","url":"https://www.cve.org/CVERecord?id=CVE-2016-0758"},{"name":"CVE-2016-4565","url":"https://www.cve.org/CVERecord?id=CVE-2016-4565"},{"name":"CVE-2016-4913","url":"https://www.cve.org/CVERecord?id=CVE-2016-4913"},{"name":"CVE-2016-4569","url":"https://www.cve.org/CVERecord?id=CVE-2016-4569"},{"name":"CVE-2016-3134","url":"https://www.cve.org/CVERecord?id=CVE-2016-3134"},{"name":"CVE-2016-4580","url":"https://www.cve.org/CVERecord?id=CVE-2016-4580"},{"name":"CVE-2016-2187","url":"https://www.cve.org/CVERecord?id=CVE-2016-2187"},{"name":"CVE-2016-2053","url":"https://www.cve.org/CVERecord?id=CVE-2016-2053"},{"name":"CVE-2016-3707","url":"https://www.cve.org/CVERecord?id=CVE-2016-3707"},{"name":"CVE-2016-4482","url":"https://www.cve.org/CVERecord?id=CVE-2016-4482"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2016:1985-1 du 08 ao\u00fbt    2016","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"}],"reference":"CERTFR-2016-AVI-267","revisions":[{"description":"version initiale.","revision_date":"2016-08-10T00:00:00.000000"}],"risks":[{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">le noyau Linux SUSE</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l'\u00e9diteur, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux SUSE","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2016:1985-1 du 08 ao\u00fbt 2016","url":null}]}
