{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SUSE Linux Enterprise Live Patching 12-SP5, 15-SP2, 15-SP3, 15-SP4 et 15-SP5","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP2, SP3, SP4 et SP5","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 12 SP5","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.1, 5.2, 5.3, 5.4 et 5.5","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 12 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP2, SP3, SP4, SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Real Time 15 SP4, SP5","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP2, SP3, SP4, SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap 15.3, 15.4, 15.5","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-4921","url":"https://www.cve.org/CVERecord?id=CVE-2023-4921"},{"name":"CVE-2023-39198","url":"https://www.cve.org/CVERecord?id=CVE-2023-39198"},{"name":"CVE-2023-51780","url":"https://www.cve.org/CVERecord?id=CVE-2023-51780"},{"name":"CVE-2023-1829","url":"https://www.cve.org/CVERecord?id=CVE-2023-1829"}],"links":[],"reference":"CERTFR-2024-AVI-0179","revisions":[{"description":"Version initiale","revision_date":"2024-03-01T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans <span\nclass=\"textit\">le noyau Linux de SUSE</span>. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, un contournement de la\npolitique de s\u00e9curit\u00e9 et une \u00e9l\u00e9vation de privil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0655-1 du 28 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240655-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0727-1 du 29 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240727-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0665-1 du 28 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240665-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0685-1 du 29 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240685-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0666-1 du 28 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240666-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0698-1 du 29 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240698-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0695-1 du 29 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240695-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0656-1 du 28 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240656-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0694-1 du 29 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240694-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0620-1 du 26 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240620-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0705-1 du 29 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240705-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0663-1 du 28 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240663-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0662-1 du 28 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240662-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0639-1 du 27 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240639-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0624-1 du 26 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240624-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0622-1 du 26 f\u00e9vrier 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240622-1"}]}
