{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.6 ppc64","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Virtualization Host - Extended Update Support 4.2 for RHEL 7.6 x86_64","product":{"name":"N/A","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le","product":{"name":"Red Hat Enterprise Linux Server","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.3 x86_64","product":{"name":"Red Hat Enterprise Linux Server","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux Server - AUS 7.3 x86_64","product":{"name":"Red Hat Enterprise Linux Server","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for Power 9 7 ppc64le","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux EUS Compute Node 7.6 x86_64","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux Server - TUS 7.6 x86_64","product":{"name":"Red Hat Enterprise Linux Server","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.6 ppc64le","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for IBM System z (Structure A) 7 s390x","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64","product":{"name":"Red Hat Enterprise Linux Server","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for ARM 64 7 aarch64","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.6 s390x","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux Server - TUS 7.3 x86_64","product":{"name":"Red Hat Enterprise Linux Server","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux Server - AUS 7.6 x86_64","product":{"name":"Red Hat Enterprise Linux Server","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.3 ppc64le","product":{"name":"Red Hat Enterprise Linux Server","vendor":{"name":"Red Hat","scada":false}}},{"description":"Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.6 x86_64","product":{"name":"Red Hat Enterprise Linux","vendor":{"name":"Red Hat","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2018-18281","url":"https://www.cve.org/CVERecord?id=CVE-2018-18281"},{"name":"CVE-2019-3846","url":"https://www.cve.org/CVERecord?id=CVE-2019-3846"},{"name":"CVE-2018-18559","url":"https://www.cve.org/CVERecord?id=CVE-2018-18559"},{"name":"CVE-2019-14814","url":"https://www.cve.org/CVERecord?id=CVE-2019-14814"},{"name":"CVE-2019-14815","url":"https://www.cve.org/CVERecord?id=CVE-2019-14815"},{"name":"CVE-2018-20976","url":"https://www.cve.org/CVERecord?id=CVE-2018-20976"},{"name":"CVE-2019-17133","url":"https://www.cve.org/CVERecord?id=CVE-2019-17133"},{"name":"CVE-2019-11599","url":"https://www.cve.org/CVERecord?id=CVE-2019-11599"},{"name":"CVE-2019-10126","url":"https://www.cve.org/CVERecord?id=CVE-2019-10126"},{"name":"CVE-2019-11487","url":"https://www.cve.org/CVERecord?id=CVE-2019-11487"},{"name":"CVE-2018-3693","url":"https://www.cve.org/CVERecord?id=CVE-2018-3693"},{"name":"CVE-2019-14816","url":"https://www.cve.org/CVERecord?id=CVE-2019-14816"},{"name":"CVE-2019-18660","url":"https://www.cve.org/CVERecord?id=CVE-2019-18660"},{"name":"CVE-2019-8912","url":"https://www.cve.org/CVERecord?id=CVE-2019-8912"},{"name":"CVE-2018-10853","url":"https://www.cve.org/CVERecord?id=CVE-2018-10853"}],"links":[],"reference":"CERTFR-2020-AVI-051","revisions":[{"description":"Version initiale","revision_date":"2020-01-22T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat . Certaines d'entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2020:0179 du 21 janvier 2020","url":"https://access.redhat.com/errata/RHSA-2020:0179"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2020:0174 du 21 janvier 2020","url":"https://access.redhat.com/errata/RHSA-2020:0174"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2020:0178 du 21 janvier 2020","url":"https://access.redhat.com/errata/RHSA-2020:0178"}]}
