{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SUSE Linux Enterprise High Performance Computing 15 SP5","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP1","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap 15.5","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP5","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 12 SP5","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP4","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP1","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 12-SP5","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap 15.4","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 12 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.2","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP3","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.1","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro for Rancher 5.4","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Real Time 12 SP5","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Real Time Module 15-SP5","product":{"name":"SUSE Real Time Module","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.3","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Real Time 15 SP5","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro for Rancher 5.3","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Real Time 15 SP4","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP3","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Real Time Module 15-SP4","product":{"name":"SUSE Real Time Module","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP4","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP1","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP3","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP1","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.5","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP4","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP3","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.4","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP4","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-38457","url":"https://www.cve.org/CVERecord?id=CVE-2022-38457"},{"name":"CVE-2023-4385","url":"https://www.cve.org/CVERecord?id=CVE-2023-4385"},{"name":"CVE-2023-37453","url":"https://www.cve.org/CVERecord?id=CVE-2023-37453"},{"name":"CVE-2023-40283","url":"https://www.cve.org/CVERecord?id=CVE-2023-40283"},{"name":"CVE-2023-4133","url":"https://www.cve.org/CVERecord?id=CVE-2023-4133"},{"name":"CVE-2022-40133","url":"https://www.cve.org/CVERecord?id=CVE-2022-40133"},{"name":"CVE-2023-20588","url":"https://www.cve.org/CVERecord?id=CVE-2023-20588"},{"name":"CVE-2023-2007","url":"https://www.cve.org/CVERecord?id=CVE-2023-2007"},{"name":"CVE-2023-3090","url":"https://www.cve.org/CVERecord?id=CVE-2023-3090"},{"name":"CVE-2023-4569","url":"https://www.cve.org/CVERecord?id=CVE-2023-4569"},{"name":"CVE-2023-4128","url":"https://www.cve.org/CVERecord?id=CVE-2023-4128"},{"name":"CVE-2023-3812","url":"https://www.cve.org/CVERecord?id=CVE-2023-3812"},{"name":"CVE-2023-4563","url":"https://www.cve.org/CVERecord?id=CVE-2023-4563"},{"name":"CVE-2023-4387","url":"https://www.cve.org/CVERecord?id=CVE-2023-4387"},{"name":"CVE-2023-2176","url":"https://www.cve.org/CVERecord?id=CVE-2023-2176"},{"name":"CVE-2022-36402","url":"https://www.cve.org/CVERecord?id=CVE-2022-36402"},{"name":"CVE-2023-4459","url":"https://www.cve.org/CVERecord?id=CVE-2023-4459"},{"name":"CVE-2023-3772","url":"https://www.cve.org/CVERecord?id=CVE-2023-3772"},{"name":"CVE-2023-3567","url":"https://www.cve.org/CVERecord?id=CVE-2023-3567"},{"name":"CVE-2023-4194","url":"https://www.cve.org/CVERecord?id=CVE-2023-4194"},{"name":"CVE-2023-3863","url":"https://www.cve.org/CVERecord?id=CVE-2023-3863"},{"name":"CVE-2023-4147","url":"https://www.cve.org/CVERecord?id=CVE-2023-4147"},{"name":"CVE-2023-3610","url":"https://www.cve.org/CVERecord?id=CVE-2023-3610"},{"name":"CVE-2023-1077","url":"https://www.cve.org/CVERecord?id=CVE-2023-1077"},{"name":"CVE-2023-4273","url":"https://www.cve.org/CVERecord?id=CVE-2023-4273"},{"name":"CVE-2023-35001","url":"https://www.cve.org/CVERecord?id=CVE-2023-35001"},{"name":"CVE-2023-4132","url":"https://www.cve.org/CVERecord?id=CVE-2023-4132"},{"name":"CVE-2023-4134","url":"https://www.cve.org/CVERecord?id=CVE-2023-4134"},{"name":"CVE-2023-32233","url":"https://www.cve.org/CVERecord?id=CVE-2023-32233"},{"name":"CVE-2023-2156","url":"https://www.cve.org/CVERecord?id=CVE-2023-2156"},{"name":"CVE-2023-34319","url":"https://www.cve.org/CVERecord?id=CVE-2023-34319"}],"links":[],"reference":"CERTFR-2023-AVI-0754","revisions":[{"description":"Version initiale","revision_date":"2023-09-15T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"},{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans <span\nclass=\"textit\">le noyau Linux de SUSE</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une \u00e9l\u00e9vation de privil\u00e8ges et une ex\u00e9cution de code\narbitraire \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3603-1 du 15 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233603-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3566-1 du 11 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233566-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3594-1 du 13 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233594-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3595-1 du 13 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233595-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3600-1 du 14 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233600-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3585-1 du 11 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233585-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3598-1 du 13 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233598-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3571-1 du 11 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233571-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3607-1 du 15 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233607-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3596-1 du 13 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233596-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3592-1 du 13 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233592-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3582-1 du 11 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233582-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3572-1 du 11 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233572-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3576-1 du 11 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233576-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3601-1 du 14 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233601-1/"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3599-1 du 14 septembre 2023","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233599-1/"}]}
