{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SUSE Linux Enterprise High Performance Computing 15 SP5","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"Legacy Module 15-SP5","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap 15.5","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP5","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Desktop 15 SP5","product":{"name":"SUSE Linux Enterprise Desktop","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP4","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Manager Retail Branch Server 4.3","product":{"name":"SUSE Manager Retail Branch Server","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap 15.4","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Availability Extension 15 SP4","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing LTSS 15 SP4","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Availability Extension 15 SP5","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro for Rancher 5.4","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Real Time Module 15-SP5","product":{"name":"SUSE Real Time Module","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"Basesystem Module 15-SP5","product":{"name":"Basesystem Module","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.3","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Real Time 15 SP5","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap Micro 5.3","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro for Rancher 5.3","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Real Time 15 SP4","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Manager Proxy 4.3","product":{"name":"SUSE Manager Proxy","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP4","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4","product":{"name":"SUSE Linux Enterprise Desktop","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.5","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap Micro 5.4","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP4","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Workstation Extension 15 SP5","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}},{"description":"Development Tools Module 15-SP5","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Manager Server 4.3","product":{"name":"SUSE Manager Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.4","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP4","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-35827","url":"https://www.cve.org/CVERecord?id=CVE-2023-35827"},{"name":"CVE-2023-52448","url":"https://www.cve.org/CVERecord?id=CVE-2023-52448"},{"name":"CVE-2023-52456","url":"https://www.cve.org/CVERecord?id=CVE-2023-52456"},{"name":"CVE-2024-26595","url":"https://www.cve.org/CVERecord?id=CVE-2024-26595"},{"name":"CVE-2021-47076","url":"https://www.cve.org/CVERecord?id=CVE-2021-47076"},{"name":"CVE-2023-52532","url":"https://www.cve.org/CVERecord?id=CVE-2023-52532"},{"name":"CVE-2020-36777","url":"https://www.cve.org/CVERecord?id=CVE-2020-36777"},{"name":"CVE-2021-47078","url":"https://www.cve.org/CVERecord?id=CVE-2021-47078"},{"name":"CVE-2024-26586","url":"https://www.cve.org/CVERecord?id=CVE-2024-26586"},{"name":"CVE-2024-26585","url":"https://www.cve.org/CVERecord?id=CVE-2024-26585"},{"name":"CVE-2024-25744","url":"https://www.cve.org/CVERecord?id=CVE-2024-25744"},{"name":"CVE-2023-52429","url":"https://www.cve.org/CVERecord?id=CVE-2023-52429"},{"name":"CVE-2023-52559","url":"https://www.cve.org/CVERecord?id=CVE-2023-52559"},{"name":"CVE-2021-46953","url":"https://www.cve.org/CVERecord?id=CVE-2021-46953"},{"name":"CVE-2024-26603","url":"https://www.cve.org/CVERecord?id=CVE-2024-26603"},{"name":"CVE-2023-28746","url":"https://www.cve.org/CVERecord?id=CVE-2023-28746"},{"name":"CVE-2021-46904","url":"https://www.cve.org/CVERecord?id=CVE-2021-46904"},{"name":"CVE-2024-26589","url":"https://www.cve.org/CVERecord?id=CVE-2024-26589"},{"name":"CVE-2019-25162","url":"https://www.cve.org/CVERecord?id=CVE-2019-25162"},{"name":"CVE-2023-52478","url":"https://www.cve.org/CVERecord?id=CVE-2023-52478"},{"name":"CVE-2023-46343","url":"https://www.cve.org/CVERecord?id=CVE-2023-46343"},{"name":"CVE-2021-46968","url":"https://www.cve.org/CVERecord?id=CVE-2021-46968"},{"name":"CVE-2021-46929","url":"https://www.cve.org/CVERecord?id=CVE-2021-46929"},{"name":"CVE-2021-46905","url":"https://www.cve.org/CVERecord?id=CVE-2021-46905"},{"name":"CVE-2021-47061","url":"https://www.cve.org/CVERecord?id=CVE-2021-47061"},{"name":"CVE-2021-46924","url":"https://www.cve.org/CVERecord?id=CVE-2021-46924"},{"name":"CVE-2021-46906","url":"https://www.cve.org/CVERecord?id=CVE-2021-46906"},{"name":"CVE-2021-47012","url":"https://www.cve.org/CVERecord?id=CVE-2021-47012"},{"name":"CVE-2023-52340","url":"https://www.cve.org/CVERecord?id=CVE-2023-52340"},{"name":"CVE-2023-6817","url":"https://www.cve.org/CVERecord?id=CVE-2023-6817"},{"name":"CVE-2023-52605","url":"https://www.cve.org/CVERecord?id=CVE-2023-52605"},{"name":"CVE-2021-46964","url":"https://www.cve.org/CVERecord?id=CVE-2021-46964"},{"name":"CVE-2024-26598","url":"https://www.cve.org/CVERecord?id=CVE-2024-26598"},{"name":"CVE-2023-52482","url":"https://www.cve.org/CVERecord?id=CVE-2023-52482"},{"name":"CVE-2022-20154","url":"https://www.cve.org/CVERecord?id=CVE-2022-20154"},{"name":"CVE-2021-47013","url":"https://www.cve.org/CVERecord?id=CVE-2021-47013"},{"name":"CVE-2021-46966","url":"https://www.cve.org/CVERecord?id=CVE-2021-46966"},{"name":"CVE-2023-52475","url":"https://www.cve.org/CVERecord?id=CVE-2023-52475"},{"name":"CVE-2024-26593","url":"https://www.cve.org/CVERecord?id=CVE-2024-26593"},{"name":"CVE-2023-6270","url":"https://www.cve.org/CVERecord?id=CVE-2023-6270"},{"name":"CVE-2022-48627","url":"https://www.cve.org/CVERecord?id=CVE-2022-48627"},{"name":"CVE-2021-46915","url":"https://www.cve.org/CVERecord?id=CVE-2021-46915"},{"name":"CVE-2023-52462","url":"https://www.cve.org/CVERecord?id=CVE-2023-52462"},{"name":"CVE-2021-46989","url":"https://www.cve.org/CVERecord?id=CVE-2021-46989"},{"name":"CVE-2021-47054","url":"https://www.cve.org/CVERecord?id=CVE-2021-47054"},{"name":"CVE-2023-52484","url":"https://www.cve.org/CVERecord?id=CVE-2023-52484"},{"name":"CVE-2023-52569","url":"https://www.cve.org/CVERecord?id=CVE-2023-52569"},{"name":"CVE-2023-52451","url":"https://www.cve.org/CVERecord?id=CVE-2023-52451"},{"name":"CVE-2024-0607","url":"https://www.cve.org/CVERecord?id=CVE-2024-0607"},{"name":"CVE-2024-26607","url":"https://www.cve.org/CVERecord?id=CVE-2024-26607"},{"name":"CVE-2023-52439","url":"https://www.cve.org/CVERecord?id=CVE-2023-52439"},{"name":"CVE-2023-52574","url":"https://www.cve.org/CVERecord?id=CVE-2023-52574"},{"name":"CVE-2023-52445","url":"https://www.cve.org/CVERecord?id=CVE-2023-52445"},{"name":"CVE-2024-23850","url":"https://www.cve.org/CVERecord?id=CVE-2024-23850"},{"name":"CVE-2021-47083","url":"https://www.cve.org/CVERecord?id=CVE-2021-47083"},{"name":"CVE-2021-47060","url":"https://www.cve.org/CVERecord?id=CVE-2021-47060"},{"name":"CVE-2021-46974","url":"https://www.cve.org/CVERecord?id=CVE-2021-46974"},{"name":"CVE-2024-1151","url":"https://www.cve.org/CVERecord?id=CVE-2024-1151"},{"name":"CVE-2024-23851","url":"https://www.cve.org/CVERecord?id=CVE-2024-23851"},{"name":"CVE-2021-46923","url":"https://www.cve.org/CVERecord?id=CVE-2021-46923"},{"name":"CVE-2024-26602","url":"https://www.cve.org/CVERecord?id=CVE-2024-26602"},{"name":"CVE-2021-46934","url":"https://www.cve.org/CVERecord?id=CVE-2021-46934"},{"name":"CVE-2021-46932","url":"https://www.cve.org/CVERecord?id=CVE-2021-46932"},{"name":"CVE-2024-26591","url":"https://www.cve.org/CVERecord?id=CVE-2024-26591"},{"name":"CVE-2023-52447","url":"https://www.cve.org/CVERecord?id=CVE-2023-52447"},{"name":"CVE-2023-52464","url":"https://www.cve.org/CVERecord?id=CVE-2023-52464"},{"name":"CVE-2021-47069","url":"https://www.cve.org/CVERecord?id=CVE-2021-47069"},{"name":"CVE-2023-52502","url":"https://www.cve.org/CVERecord?id=CVE-2023-52502"},{"name":"CVE-2023-52597","url":"https://www.cve.org/CVERecord?id=CVE-2023-52597"},{"name":"CVE-2023-5197","url":"https://www.cve.org/CVERecord?id=CVE-2023-5197"},{"name":"CVE-2023-52531","url":"https://www.cve.org/CVERecord?id=CVE-2023-52531"},{"name":"CVE-2023-51042","url":"https://www.cve.org/CVERecord?id=CVE-2023-51042"},{"name":"CVE-2023-52463","url":"https://www.cve.org/CVERecord?id=CVE-2023-52463"},{"name":"CVE-2023-52467","url":"https://www.cve.org/CVERecord?id=CVE-2023-52467"},{"name":"CVE-2024-0340","url":"https://www.cve.org/CVERecord?id=CVE-2024-0340"},{"name":"CVE-2023-52443","url":"https://www.cve.org/CVERecord?id=CVE-2023-52443"},{"name":"CVE-2023-52530","url":"https://www.cve.org/CVERecord?id=CVE-2023-52530"},{"name":"CVE-2021-47005","url":"https://www.cve.org/CVERecord?id=CVE-2021-47005"},{"name":"CVE-2020-36784","url":"https://www.cve.org/CVERecord?id=CVE-2020-36784"},{"name":"CVE-2023-52452","url":"https://www.cve.org/CVERecord?id=CVE-2023-52452"},{"name":"CVE-2024-23849","url":"https://www.cve.org/CVERecord?id=CVE-2024-23849"},{"name":"CVE-2022-48628","url":"https://www.cve.org/CVERecord?id=CVE-2022-48628"},{"name":"CVE-2024-26622","url":"https://www.cve.org/CVERecord?id=CVE-2024-26622"},{"name":"CVE-2023-52457","url":"https://www.cve.org/CVERecord?id=CVE-2023-52457"},{"name":"CVE-2023-52449","url":"https://www.cve.org/CVERecord?id=CVE-2023-52449"}],"links":[],"reference":"CERTFR-2024-AVI-0242","revisions":[{"description":"Version initiale","revision_date":"2024-03-22T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"},{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans <span\nclass=\"textit\">le noyau Linux de SUSE</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l'\u00e9diteur, une ex\u00e9cution de code arbitraire et un d\u00e9ni de\nservice \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0900-1 du 14 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240900-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0857-1 du 13 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240857-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0855-1 du 12 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240855-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0858-1 du 13 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240858-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0900-2 du 15 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240900-2"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0910-1 du 15 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240910-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0856-1 du 13 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240856-1"}]}
