{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SUSE Linux Enterprise High Performance Computing 15 SP5","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap 15.5","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP5","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap 15.3","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 12 SP5","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP4","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP2","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP2","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 12-SP5","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 12 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.2","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP3","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.1","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro for Rancher 5.4","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Real Time 12 SP5","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Availability Extension 12 SP5","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Manager Server 4.1","product":{"name":"SUSE Manager Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.3","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Real Time 15 SP5","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Workstation Extension 12 12-SP5","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap Micro 5.3","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro for Rancher 5.3","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Manager Retail Branch Server 4.1","product":{"name":"SUSE Manager Retail Branch Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Real Time 15 SP4","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP3","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Availability Extension 15 SP2","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Manager Proxy 4.1","product":{"name":"SUSE Manager Proxy","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP4","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Software Development Kit 12 SP5","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP3","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.5","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap Micro 5.4","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP4","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP2","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP3","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.4","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP4","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP2","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-35827","url":"https://www.cve.org/CVERecord?id=CVE-2023-35827"},{"name":"CVE-2023-52448","url":"https://www.cve.org/CVERecord?id=CVE-2023-52448"},{"name":"CVE-2023-52456","url":"https://www.cve.org/CVERecord?id=CVE-2023-52456"},{"name":"CVE-2023-46813","url":"https://www.cve.org/CVERecord?id=CVE-2023-46813"},{"name":"CVE-2024-26595","url":"https://www.cve.org/CVERecord?id=CVE-2024-26595"},{"name":"CVE-2021-47076","url":"https://www.cve.org/CVERecord?id=CVE-2021-47076"},{"name":"CVE-2023-52532","url":"https://www.cve.org/CVERecord?id=CVE-2023-52532"},{"name":"CVE-2023-0461","url":"https://www.cve.org/CVERecord?id=CVE-2023-0461"},{"name":"CVE-2020-36777","url":"https://www.cve.org/CVERecord?id=CVE-2020-36777"},{"name":"CVE-2021-47078","url":"https://www.cve.org/CVERecord?id=CVE-2021-47078"},{"name":"CVE-2024-26586","url":"https://www.cve.org/CVERecord?id=CVE-2024-26586"},{"name":"CVE-2024-26585","url":"https://www.cve.org/CVERecord?id=CVE-2024-26585"},{"name":"CVE-2023-52429","url":"https://www.cve.org/CVERecord?id=CVE-2023-52429"},{"name":"CVE-2023-52559","url":"https://www.cve.org/CVERecord?id=CVE-2023-52559"},{"name":"CVE-2021-46953","url":"https://www.cve.org/CVERecord?id=CVE-2021-46953"},{"name":"CVE-2024-26603","url":"https://www.cve.org/CVERecord?id=CVE-2024-26603"},{"name":"CVE-2023-6536","url":"https://www.cve.org/CVERecord?id=CVE-2023-6536"},{"name":"CVE-2023-6531","url":"https://www.cve.org/CVERecord?id=CVE-2023-6531"},{"name":"CVE-2024-26600","url":"https://www.cve.org/CVERecord?id=CVE-2024-26600"},{"name":"CVE-2023-28746","url":"https://www.cve.org/CVERecord?id=CVE-2023-28746"},{"name":"CVE-2021-46904","url":"https://www.cve.org/CVERecord?id=CVE-2021-46904"},{"name":"CVE-2024-26589","url":"https://www.cve.org/CVERecord?id=CVE-2024-26589"},{"name":"CVE-2019-25162","url":"https://www.cve.org/CVERecord?id=CVE-2019-25162"},{"name":"CVE-2023-52478","url":"https://www.cve.org/CVERecord?id=CVE-2023-52478"},{"name":"CVE-2023-46343","url":"https://www.cve.org/CVERecord?id=CVE-2023-46343"},{"name":"CVE-2021-46929","url":"https://www.cve.org/CVERecord?id=CVE-2021-46929"},{"name":"CVE-2021-46905","url":"https://www.cve.org/CVERecord?id=CVE-2021-46905"},{"name":"CVE-2021-47061","url":"https://www.cve.org/CVERecord?id=CVE-2021-47061"},{"name":"CVE-2023-51779","url":"https://www.cve.org/CVERecord?id=CVE-2023-51779"},{"name":"CVE-2021-46924","url":"https://www.cve.org/CVERecord?id=CVE-2021-46924"},{"name":"CVE-2021-46906","url":"https://www.cve.org/CVERecord?id=CVE-2021-46906"},{"name":"CVE-2021-47012","url":"https://www.cve.org/CVERecord?id=CVE-2021-47012"},{"name":"CVE-2023-52340","url":"https://www.cve.org/CVERecord?id=CVE-2023-52340"},{"name":"CVE-2023-6817","url":"https://www.cve.org/CVERecord?id=CVE-2023-6817"},{"name":"CVE-2023-52605","url":"https://www.cve.org/CVERecord?id=CVE-2023-52605"},{"name":"CVE-2021-46964","url":"https://www.cve.org/CVERecord?id=CVE-2021-46964"},{"name":"CVE-2024-26598","url":"https://www.cve.org/CVERecord?id=CVE-2024-26598"},{"name":"CVE-2021-46991","url":"https://www.cve.org/CVERecord?id=CVE-2021-46991"},{"name":"CVE-2023-52482","url":"https://www.cve.org/CVERecord?id=CVE-2023-52482"},{"name":"CVE-2022-20154","url":"https://www.cve.org/CVERecord?id=CVE-2022-20154"},{"name":"CVE-2021-47013","url":"https://www.cve.org/CVERecord?id=CVE-2021-47013"},{"name":"CVE-2021-46966","url":"https://www.cve.org/CVERecord?id=CVE-2021-46966"},{"name":"CVE-2023-52475","url":"https://www.cve.org/CVERecord?id=CVE-2023-52475"},{"name":"CVE-2024-26593","url":"https://www.cve.org/CVERecord?id=CVE-2024-26593"},{"name":"CVE-2023-6270","url":"https://www.cve.org/CVERecord?id=CVE-2023-6270"},{"name":"CVE-2022-48627","url":"https://www.cve.org/CVERecord?id=CVE-2022-48627"},{"name":"CVE-2021-46915","url":"https://www.cve.org/CVERecord?id=CVE-2021-46915"},{"name":"CVE-2021-46989","url":"https://www.cve.org/CVERecord?id=CVE-2021-46989"},{"name":"CVE-2023-6356","url":"https://www.cve.org/CVERecord?id=CVE-2023-6356"},{"name":"CVE-2021-47054","url":"https://www.cve.org/CVERecord?id=CVE-2021-47054"},{"name":"CVE-2023-52484","url":"https://www.cve.org/CVERecord?id=CVE-2023-52484"},{"name":"CVE-2023-52569","url":"https://www.cve.org/CVERecord?id=CVE-2023-52569"},{"name":"CVE-2023-52451","url":"https://www.cve.org/CVERecord?id=CVE-2023-52451"},{"name":"CVE-2024-0607","url":"https://www.cve.org/CVERecord?id=CVE-2024-0607"},{"name":"CVE-2024-26607","url":"https://www.cve.org/CVERecord?id=CVE-2024-26607"},{"name":"CVE-2023-52439","url":"https://www.cve.org/CVERecord?id=CVE-2023-52439"},{"name":"CVE-2023-52574","url":"https://www.cve.org/CVERecord?id=CVE-2023-52574"},{"name":"CVE-2023-52445","url":"https://www.cve.org/CVERecord?id=CVE-2023-52445"},{"name":"CVE-2024-23850","url":"https://www.cve.org/CVERecord?id=CVE-2024-23850"},{"name":"CVE-2023-6535","url":"https://www.cve.org/CVERecord?id=CVE-2023-6535"},{"name":"CVE-2021-47083","url":"https://www.cve.org/CVERecord?id=CVE-2021-47083"},{"name":"CVE-2021-47060","url":"https://www.cve.org/CVERecord?id=CVE-2021-47060"},{"name":"CVE-2021-46974","url":"https://www.cve.org/CVERecord?id=CVE-2021-46974"},{"name":"CVE-2024-1151","url":"https://www.cve.org/CVERecord?id=CVE-2024-1151"},{"name":"CVE-2021-47077","url":"https://www.cve.org/CVERecord?id=CVE-2021-47077"},{"name":"CVE-2024-23851","url":"https://www.cve.org/CVERecord?id=CVE-2024-23851"},{"name":"CVE-2021-46923","url":"https://www.cve.org/CVERecord?id=CVE-2021-46923"},{"name":"CVE-2024-26602","url":"https://www.cve.org/CVERecord?id=CVE-2024-26602"},{"name":"CVE-2021-46934","url":"https://www.cve.org/CVERecord?id=CVE-2021-46934"},{"name":"CVE-2023-39191","url":"https://www.cve.org/CVERecord?id=CVE-2023-39191"},{"name":"CVE-2021-46932","url":"https://www.cve.org/CVERecord?id=CVE-2021-46932"},{"name":"CVE-2024-26591","url":"https://www.cve.org/CVERecord?id=CVE-2024-26591"},{"name":"CVE-2023-52447","url":"https://www.cve.org/CVERecord?id=CVE-2023-52447"},{"name":"CVE-2023-52464","url":"https://www.cve.org/CVERecord?id=CVE-2023-52464"},{"name":"CVE-2021-47069","url":"https://www.cve.org/CVERecord?id=CVE-2021-47069"},{"name":"CVE-2023-52502","url":"https://www.cve.org/CVERecord?id=CVE-2023-52502"},{"name":"CVE-2021-33200","url":"https://www.cve.org/CVERecord?id=CVE-2021-33200"},{"name":"CVE-2023-52597","url":"https://www.cve.org/CVERecord?id=CVE-2023-52597"},{"name":"CVE-2023-5197","url":"https://www.cve.org/CVERecord?id=CVE-2023-5197"},{"name":"CVE-2023-52531","url":"https://www.cve.org/CVERecord?id=CVE-2023-52531"},{"name":"CVE-2021-46921","url":"https://www.cve.org/CVERecord?id=CVE-2021-46921"},{"name":"CVE-2023-51042","url":"https://www.cve.org/CVERecord?id=CVE-2023-51042"},{"name":"CVE-2023-52463","url":"https://www.cve.org/CVERecord?id=CVE-2023-52463"},{"name":"CVE-2023-52467","url":"https://www.cve.org/CVERecord?id=CVE-2023-52467"},{"name":"CVE-2024-0340","url":"https://www.cve.org/CVERecord?id=CVE-2024-0340"},{"name":"CVE-2023-52443","url":"https://www.cve.org/CVERecord?id=CVE-2023-52443"},{"name":"CVE-2023-52530","url":"https://www.cve.org/CVERecord?id=CVE-2023-52530"},{"name":"CVE-2021-47005","url":"https://www.cve.org/CVERecord?id=CVE-2021-47005"},{"name":"CVE-2020-36784","url":"https://www.cve.org/CVERecord?id=CVE-2020-36784"},{"name":"CVE-2023-52452","url":"https://www.cve.org/CVERecord?id=CVE-2023-52452"},{"name":"CVE-2024-23849","url":"https://www.cve.org/CVERecord?id=CVE-2024-23849"},{"name":"CVE-2024-26622","url":"https://www.cve.org/CVERecord?id=CVE-2024-26622"},{"name":"CVE-2021-46992","url":"https://www.cve.org/CVERecord?id=CVE-2021-46992"},{"name":"CVE-2023-52457","url":"https://www.cve.org/CVERecord?id=CVE-2023-52457"},{"name":"CVE-2023-52449","url":"https://www.cve.org/CVERecord?id=CVE-2023-52449"}],"links":[],"reference":"CERTFR-2024-AVI-0265","revisions":[{"description":"Version initiale","revision_date":"2024-03-29T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans <span\nclass=\"textit\">le noyau Linux de SUSE</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution de code\narbitraire.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0989-1 du 25 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240989-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0986-1 du 26 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240986-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1053-1 du 28 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241053-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1033-1 du 28 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241033-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0975-1 du 22 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240975-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0977-1 du 22 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240977-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0926-1 du 18 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240926-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1025-1 du 28 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241025-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1017-1 du 28 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241017-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0976-1 du 22 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240976-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1047-1 du 28 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241047-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1040-1 du 28 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241040-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1023-1 du 28 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241023-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1039-1 du 28 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241039-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0991-1 du 26 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240991-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1054-1 du 28 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241054-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1045-1 du 28 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241045-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0925-1 du 18 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240925-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:0995-1 du 26 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240995-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1028-1 du 28 mars 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241028-1"}]}
