{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Red Hat Enterprise Linux Server - AUS 8.6 x86_64","product":{"name":"Red Hat Enterprise Linux Server","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le","product":{"name":"Red Hat Enterprise Linux Server","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux Server - TUS 8.6 x86_64","product":{"name":"Red Hat Enterprise Linux Server","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64","product":{"name":"Red Hat CodeReady Linux Builder","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64","product":{"name":"Red Hat CodeReady Linux Builder","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Virtualization Host 4 for RHEL 8 x86_64","product":{"name":"Virtualization","vendor":{"name":"Oracle","scada":false}}},{"description":"Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le","product":{"name":"Red Hat CodeReady Linux Builder","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-3707","url":"https://www.cve.org/CVERecord?id=CVE-2022-3707"},{"name":"CVE-2023-46813","url":"https://www.cve.org/CVERecord?id=CVE-2023-46813"},{"name":"CVE-2023-28328","url":"https://www.cve.org/CVERecord?id=CVE-2023-28328"},{"name":"CVE-2023-6536","url":"https://www.cve.org/CVERecord?id=CVE-2023-6536"},{"name":"CVE-2021-30002","url":"https://www.cve.org/CVERecord?id=CVE-2021-30002"},{"name":"CVE-2023-23455","url":"https://www.cve.org/CVERecord?id=CVE-2023-23455"},{"name":"CVE-2024-0646","url":"https://www.cve.org/CVERecord?id=CVE-2024-0646"},{"name":"CVE-2023-40283","url":"https://www.cve.org/CVERecord?id=CVE-2023-40283"},{"name":"CVE-2022-39189","url":"https://www.cve.org/CVERecord?id=CVE-2022-39189"},{"name":"CVE-2022-0168","url":"https://www.cve.org/CVERecord?id=CVE-2022-0168"},{"name":"CVE-2023-45862","url":"https://www.cve.org/CVERecord?id=CVE-2023-45862"},{"name":"CVE-2023-1989","url":"https://www.cve.org/CVERecord?id=CVE-2023-1989"},{"name":"CVE-2023-20569","url":"https://www.cve.org/CVERecord?id=CVE-2023-20569"},{"name":"CVE-2023-6817","url":"https://www.cve.org/CVERecord?id=CVE-2023-6817"},{"name":"CVE-2023-1074","url":"https://www.cve.org/CVERecord?id=CVE-2023-1074"},{"name":"CVE-2023-4921","url":"https://www.cve.org/CVERecord?id=CVE-2023-4921"},{"name":"CVE-2022-21499","url":"https://www.cve.org/CVERecord?id=CVE-2022-21499"},{"name":"CVE-2022-1462","url":"https://www.cve.org/CVERecord?id=CVE-2022-1462"},{"name":"CVE-2023-6356","url":"https://www.cve.org/CVERecord?id=CVE-2023-6356"},{"name":"CVE-2022-2078","url":"https://www.cve.org/CVERecord?id=CVE-2022-2078"},{"name":"CVE-2023-1252","url":"https://www.cve.org/CVERecord?id=CVE-2023-1252"},{"name":"CVE-2022-2663","url":"https://www.cve.org/CVERecord?id=CVE-2022-2663"},{"name":"CVE-2022-2586","url":"https://www.cve.org/CVERecord?id=CVE-2022-2586"},{"name":"CVE-2022-28893","url":"https://www.cve.org/CVERecord?id=CVE-2022-28893"},{"name":"CVE-2022-3545","url":"https://www.cve.org/CVERecord?id=CVE-2022-3545"},{"name":"CVE-2023-2176","url":"https://www.cve.org/CVERecord?id=CVE-2023-2176"},{"name":"CVE-2022-3524","url":"https://www.cve.org/CVERecord?id=CVE-2022-3524"},{"name":"CVE-2023-28772","url":"https://www.cve.org/CVERecord?id=CVE-2023-28772"},{"name":"CVE-2023-1075","url":"https://www.cve.org/CVERecord?id=CVE-2023-1075"},{"name":"CVE-2021-3640","url":"https://www.cve.org/CVERecord?id=CVE-2021-3640"},{"name":"CVE-2022-45887","url":"https://www.cve.org/CVERecord?id=CVE-2022-45887"},{"name":"CVE-2023-6535","url":"https://www.cve.org/CVERecord?id=CVE-2023-6535"},{"name":"CVE-2022-0500","url":"https://www.cve.org/CVERecord?id=CVE-2022-0500"},{"name":"CVE-2022-3594","url":"https://www.cve.org/CVERecord?id=CVE-2022-3594"},{"name":"CVE-2022-36946","url":"https://www.cve.org/CVERecord?id=CVE-2022-36946"},{"name":"CVE-2022-24448","url":"https://www.cve.org/CVERecord?id=CVE-2022-24448"},{"name":"CVE-2022-3619","url":"https://www.cve.org/CVERecord?id=CVE-2022-3619"},{"name":"CVE-2023-35825","url":"https://www.cve.org/CVERecord?id=CVE-2023-35825"},{"name":"CVE-2022-25265","url":"https://www.cve.org/CVERecord?id=CVE-2022-25265"},{"name":"CVE-2023-3141","url":"https://www.cve.org/CVERecord?id=CVE-2023-3141"},{"name":"CVE-2021-4204","url":"https://www.cve.org/CVERecord?id=CVE-2021-4204"},{"name":"CVE-2022-28388","url":"https://www.cve.org/CVERecord?id=CVE-2022-28388"},{"name":"CVE-2023-6606","url":"https://www.cve.org/CVERecord?id=CVE-2023-6606"},{"name":"CVE-2022-3623","url":"https://www.cve.org/CVERecord?id=CVE-2022-3623"},{"name":"CVE-2023-6932","url":"https://www.cve.org/CVERecord?id=CVE-2023-6932"},{"name":"CVE-2023-0458","url":"https://www.cve.org/CVERecord?id=CVE-2023-0458"},{"name":"CVE-2022-0617","url":"https://www.cve.org/CVERecord?id=CVE-2022-0617"},{"name":"CVE-2021-34866","url":"https://www.cve.org/CVERecord?id=CVE-2021-34866"},{"name":"CVE-2023-7192","url":"https://www.cve.org/CVERecord?id=CVE-2023-7192"},{"name":"CVE-2023-4132","url":"https://www.cve.org/CVERecord?id=CVE-2023-4132"},{"name":"CVE-2022-3566","url":"https://www.cve.org/CVERecord?id=CVE-2022-3566"},{"name":"CVE-2022-28390","url":"https://www.cve.org/CVERecord?id=CVE-2022-28390"},{"name":"CVE-2023-5717","url":"https://www.cve.org/CVERecord?id=CVE-2023-5717"},{"name":"CVE-2022-23222","url":"https://www.cve.org/CVERecord?id=CVE-2022-23222"},{"name":"CVE-2023-2166","url":"https://www.cve.org/CVERecord?id=CVE-2023-2166"},{"name":"CVE-2023-6610","url":"https://www.cve.org/CVERecord?id=CVE-2023-6610"}],"links":[],"reference":"CERTFR-2024-AVI-0115","revisions":[{"description":"Version initiale","revision_date":"2024-02-09T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"},{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans <span\nclass=\"textit\">le noyau Linux de RedHat</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l'\u00e9diteur, une ex\u00e9cution de code arbitraire et un d\u00e9ni de\nservice \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2024:0724 du 07 f\u00e9vrier 2024","url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2024:0725 du 07 f\u00e9vrier 2024","url":"https://access.redhat.com/errata/RHSA-2024:0725"}]}
