{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SUSE Linux Enterprise High Performance Computing 15 SP5","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap 15.5","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP5","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap 15.3","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 12 SP5","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP4","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP2","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP2","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Manager Retail Branch Server 4.3","product":{"name":"SUSE Manager Retail Branch Server","vendor":{"name":"SUSE","scada":false}}},{"description":"Public Cloud Module 15-SP5","product":{"name":"Public Cloud Module","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 12-SP5","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap 15.4","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Availability Extension 15 SP4","product":{"name":"N/A","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing LTSS 15 SP4","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 12 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.2","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP3","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.1","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro for Rancher 5.4","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Real Time Module 15-SP5","product":{"name":"SUSE Real Time Module","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP5","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.3","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Real Time 15 SP5","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap Micro 5.3","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro for Rancher 5.3","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Real Time 15 SP4","product":{"name":"SUSE Linux Enterprise Real Time","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Manager Proxy 4.3","product":{"name":"SUSE Manager Proxy","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP3","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server for SAP Applications 15 SP4","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4","product":{"name":"SUSE Linux Enterprise Desktop","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP3","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.5","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"openSUSE Leap Micro 5.4","product":{"name":"openSUSE Leap","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP4","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP2","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Manager Server 4.3","product":{"name":"SUSE Manager Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Server 15 SP3","product":{"name":"SUSE Linux Enterprise Server","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Micro 5.4","product":{"name":"SUSE Linux Enterprise Micro","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise Live Patching 15-SP4","product":{"name":"SUSE Linux Enterprise Live Patching","vendor":{"name":"SUSE","scada":false}}},{"description":"SUSE Linux Enterprise High Performance Computing 15 SP2","product":{"name":"SUSE Linux Enterprise High Performance Computing","vendor":{"name":"SUSE","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-35827","url":"https://www.cve.org/CVERecord?id=CVE-2023-35827"},{"name":"CVE-2023-52567","url":"https://www.cve.org/CVERecord?id=CVE-2023-52567"},{"name":"CVE-2024-1085","url":"https://www.cve.org/CVERecord?id=CVE-2024-1085"},{"name":"CVE-2023-52477","url":"https://www.cve.org/CVERecord?id=CVE-2023-52477"},{"name":"CVE-2021-47102","url":"https://www.cve.org/CVERecord?id=CVE-2021-47102"},{"name":"CVE-2024-26654","url":"https://www.cve.org/CVERecord?id=CVE-2024-26654"},{"name":"CVE-2024-26614","url":"https://www.cve.org/CVERecord?id=CVE-2024-26614"},{"name":"CVE-2022-48626","url":"https://www.cve.org/CVERecord?id=CVE-2022-48626"},{"name":"CVE-2023-52532","url":"https://www.cve.org/CVERecord?id=CVE-2023-52532"},{"name":"CVE-2023-52621","url":"https://www.cve.org/CVERecord?id=CVE-2023-52621"},{"name":"CVE-2024-26629","url":"https://www.cve.org/CVERecord?id=CVE-2024-26629"},{"name":"CVE-2024-25739","url":"https://www.cve.org/CVERecord?id=CVE-2024-25739"},{"name":"CVE-2021-47100","url":"https://www.cve.org/CVERecord?id=CVE-2021-47100"},{"name":"CVE-2023-52637","url":"https://www.cve.org/CVERecord?id=CVE-2023-52637"},{"name":"CVE-2023-52508","url":"https://www.cve.org/CVERecord?id=CVE-2023-52508"},{"name":"CVE-2023-52559","url":"https://www.cve.org/CVERecord?id=CVE-2023-52559"},{"name":"CVE-2023-6536","url":"https://www.cve.org/CVERecord?id=CVE-2023-6536"},{"name":"CVE-2023-6531","url":"https://www.cve.org/CVERecord?id=CVE-2023-6531"},{"name":"CVE-2023-52453","url":"https://www.cve.org/CVERecord?id=CVE-2023-52453"},{"name":"CVE-2024-26600","url":"https://www.cve.org/CVERecord?id=CVE-2024-26600"},{"name":"CVE-2023-28746","url":"https://www.cve.org/CVERecord?id=CVE-2023-28746"},{"name":"CVE-2023-52563","url":"https://www.cve.org/CVERecord?id=CVE-2023-52563"},{"name":"CVE-2023-52492","url":"https://www.cve.org/CVERecord?id=CVE-2023-52492"},{"name":"CVE-2023-52515","url":"https://www.cve.org/CVERecord?id=CVE-2023-52515"},{"name":"CVE-2021-46926","url":"https://www.cve.org/CVERecord?id=CVE-2021-46926"},{"name":"CVE-2023-52454","url":"https://www.cve.org/CVERecord?id=CVE-2023-52454"},{"name":"CVE-2024-26627","url":"https://www.cve.org/CVERecord?id=CVE-2024-26627"},{"name":"CVE-2021-47094","url":"https://www.cve.org/CVERecord?id=CVE-2021-47094"},{"name":"CVE-2021-46929","url":"https://www.cve.org/CVERecord?id=CVE-2021-46929"},{"name":"CVE-2023-52632","url":"https://www.cve.org/CVERecord?id=CVE-2023-52632"},{"name":"CVE-2023-52600","url":"https://www.cve.org/CVERecord?id=CVE-2023-52600"},{"name":"CVE-2023-52507","url":"https://www.cve.org/CVERecord?id=CVE-2023-52507"},{"name":"CVE-2023-52587","url":"https://www.cve.org/CVERecord?id=CVE-2023-52587"},{"name":"CVE-2024-26645","url":"https://www.cve.org/CVERecord?id=CVE-2024-26645"},{"name":"CVE-2023-52582","url":"https://www.cve.org/CVERecord?id=CVE-2023-52582"},{"name":"CVE-2023-7042","url":"https://www.cve.org/CVERecord?id=CVE-2023-7042"},{"name":"CVE-2023-52340","url":"https://www.cve.org/CVERecord?id=CVE-2023-52340"},{"name":"CVE-2023-52605","url":"https://www.cve.org/CVERecord?id=CVE-2023-52605"},{"name":"CVE-2023-52604","url":"https://www.cve.org/CVERecord?id=CVE-2023-52604"},{"name":"CVE-2023-52518","url":"https://www.cve.org/CVERecord?id=CVE-2023-52518"},{"name":"CVE-2023-52601","url":"https://www.cve.org/CVERecord?id=CVE-2023-52601"},{"name":"CVE-2023-42753","url":"https://www.cve.org/CVERecord?id=CVE-2023-42753"},{"name":"CVE-2024-23307","url":"https://www.cve.org/CVERecord?id=CVE-2024-23307"},{"name":"CVE-2021-47099","url":"https://www.cve.org/CVERecord?id=CVE-2021-47099"},{"name":"CVE-2021-47104","url":"https://www.cve.org/CVERecord?id=CVE-2021-47104"},{"name":"CVE-2021-46933","url":"https://www.cve.org/CVERecord?id=CVE-2021-46933"},{"name":"CVE-2023-52603","url":"https://www.cve.org/CVERecord?id=CVE-2023-52603"},{"name":"CVE-2023-52528","url":"https://www.cve.org/CVERecord?id=CVE-2023-52528"},{"name":"CVE-2024-26695","url":"https://www.cve.org/CVERecord?id=CVE-2024-26695"},{"name":"CVE-2023-52482","url":"https://www.cve.org/CVERecord?id=CVE-2023-52482"},{"name":"CVE-2022-20154","url":"https://www.cve.org/CVERecord?id=CVE-2022-20154"},{"name":"CVE-2023-52486","url":"https://www.cve.org/CVERecord?id=CVE-2023-52486"},{"name":"CVE-2021-46931","url":"https://www.cve.org/CVERecord?id=CVE-2021-46931"},{"name":"CVE-2024-26670","url":"https://www.cve.org/CVERecord?id=CVE-2024-26670"},{"name":"CVE-2023-52619","url":"https://www.cve.org/CVERecord?id=CVE-2023-52619"},{"name":"CVE-2023-52617","url":"https://www.cve.org/CVERecord?id=CVE-2023-52617"},{"name":"CVE-2021-47096","url":"https://www.cve.org/CVERecord?id=CVE-2021-47096"},{"name":"CVE-2023-6270","url":"https://www.cve.org/CVERecord?id=CVE-2023-6270"},{"name":"CVE-2022-48627","url":"https://www.cve.org/CVERecord?id=CVE-2022-48627"},{"name":"CVE-2023-52462","url":"https://www.cve.org/CVERecord?id=CVE-2023-52462"},{"name":"CVE-2023-52524","url":"https://www.cve.org/CVERecord?id=CVE-2023-52524"},{"name":"CVE-2023-6356","url":"https://www.cve.org/CVERecord?id=CVE-2023-6356"},{"name":"CVE-2023-52469","url":"https://www.cve.org/CVERecord?id=CVE-2023-52469"},{"name":"CVE-2023-52493","url":"https://www.cve.org/CVERecord?id=CVE-2023-52493"},{"name":"CVE-2021-47108","url":"https://www.cve.org/CVERecord?id=CVE-2021-47108"},{"name":"CVE-2023-52484","url":"https://www.cve.org/CVERecord?id=CVE-2023-52484"},{"name":"CVE-2023-52569","url":"https://www.cve.org/CVERecord?id=CVE-2023-52569"},{"name":"CVE-2023-52481","url":"https://www.cve.org/CVERecord?id=CVE-2023-52481"},{"name":"CVE-2023-0160","url":"https://www.cve.org/CVERecord?id=CVE-2023-0160"},{"name":"CVE-2024-26599","url":"https://www.cve.org/CVERecord?id=CVE-2024-26599"},{"name":"CVE-2023-52608","url":"https://www.cve.org/CVERecord?id=CVE-2023-52608"},{"name":"CVE-2021-47082","url":"https://www.cve.org/CVERecord?id=CVE-2021-47082"},{"name":"CVE-2024-26642","url":"https://www.cve.org/CVERecord?id=CVE-2024-26642"},{"name":"CVE-2022-4744","url":"https://www.cve.org/CVERecord?id=CVE-2022-4744"},{"name":"CVE-2023-52639","url":"https://www.cve.org/CVERecord?id=CVE-2023-52639"},{"name":"CVE-2021-47091","url":"https://www.cve.org/CVERecord?id=CVE-2021-47091"},{"name":"CVE-2021-47095","url":"https://www.cve.org/CVERecord?id=CVE-2021-47095"},{"name":"CVE-2023-52599","url":"https://www.cve.org/CVERecord?id=CVE-2023-52599"},{"name":"CVE-2024-26607","url":"https://www.cve.org/CVERecord?id=CVE-2024-26607"},{"name":"CVE-2023-52574","url":"https://www.cve.org/CVERecord?id=CVE-2023-52574"},{"name":"CVE-2023-52509","url":"https://www.cve.org/CVERecord?id=CVE-2023-52509"},{"name":"CVE-2023-52470","url":"https://www.cve.org/CVERecord?id=CVE-2023-52470"},{"name":"CVE-2023-52583","url":"https://www.cve.org/CVERecord?id=CVE-2023-52583"},{"name":"CVE-2023-52602","url":"https://www.cve.org/CVERecord?id=CVE-2023-52602"},{"name":"CVE-2023-52519","url":"https://www.cve.org/CVERecord?id=CVE-2023-52519"},{"name":"CVE-2023-6535","url":"https://www.cve.org/CVERecord?id=CVE-2023-6535"},{"name":"CVE-2024-0841","url":"https://www.cve.org/CVERecord?id=CVE-2024-0841"},{"name":"CVE-2021-47098","url":"https://www.cve.org/CVERecord?id=CVE-2021-47098"},{"name":"CVE-2024-26651","url":"https://www.cve.org/CVERecord?id=CVE-2024-26651"},{"name":"CVE-2021-47083","url":"https://www.cve.org/CVERecord?id=CVE-2021-47083"},{"name":"CVE-2022-48630","url":"https://www.cve.org/CVERecord?id=CVE-2022-48630"},{"name":"CVE-2023-52510","url":"https://www.cve.org/CVERecord?id=CVE-2023-52510"},{"name":"CVE-2023-52497","url":"https://www.cve.org/CVERecord?id=CVE-2023-52497"},{"name":"CVE-2024-26646","url":"https://www.cve.org/CVERecord?id=CVE-2024-26646"},{"name":"CVE-2023-52612","url":"https://www.cve.org/CVERecord?id=CVE-2023-52612"},{"name":"CVE-2023-52500","url":"https://www.cve.org/CVERecord?id=CVE-2023-52500"},{"name":"CVE-2024-25742","url":"https://www.cve.org/CVERecord?id=CVE-2024-25742"},{"name":"CVE-2024-26602","url":"https://www.cve.org/CVERecord?id=CVE-2024-26602"},{"name":"CVE-2021-47093","url":"https://www.cve.org/CVERecord?id=CVE-2021-47093"},{"name":"CVE-2024-22099","url":"https://www.cve.org/CVERecord?id=CVE-2024-22099"},{"name":"CVE-2023-1829","url":"https://www.cve.org/CVERecord?id=CVE-2023-1829"},{"name":"CVE-2021-47097","url":"https://www.cve.org/CVERecord?id=CVE-2021-47097"},{"name":"CVE-2023-52575","url":"https://www.cve.org/CVERecord?id=CVE-2023-52575"},{"name":"CVE-2021-46934","url":"https://www.cve.org/CVERecord?id=CVE-2021-46934"},{"name":"CVE-2023-52517","url":"https://www.cve.org/CVERecord?id=CVE-2023-52517"},{"name":"CVE-2023-52598","url":"https://www.cve.org/CVERecord?id=CVE-2023-52598"},{"name":"CVE-2023-52525","url":"https://www.cve.org/CVERecord?id=CVE-2023-52525"},{"name":"CVE-2021-46927","url":"https://www.cve.org/CVERecord?id=CVE-2021-46927"},{"name":"CVE-2024-26659","url":"https://www.cve.org/CVERecord?id=CVE-2024-26659"},{"name":"CVE-2023-52450","url":"https://www.cve.org/CVERecord?id=CVE-2023-52450"},{"name":"CVE-2022-48629","url":"https://www.cve.org/CVERecord?id=CVE-2022-48629"},{"name":"CVE-2023-52594","url":"https://www.cve.org/CVERecord?id=CVE-2023-52594"},{"name":"CVE-2021-47087","url":"https://www.cve.org/CVERecord?id=CVE-2021-47087"},{"name":"CVE-2023-52595","url":"https://www.cve.org/CVERecord?id=CVE-2023-52595"},{"name":"CVE-2024-26620","url":"https://www.cve.org/CVERecord?id=CVE-2024-26620"},{"name":"CVE-2021-46925","url":"https://www.cve.org/CVERecord?id=CVE-2021-46925"},{"name":"CVE-2021-46936","url":"https://www.cve.org/CVERecord?id=CVE-2021-46936"},{"name":"CVE-2023-52623","url":"https://www.cve.org/CVERecord?id=CVE-2023-52623"},{"name":"CVE-2023-52501","url":"https://www.cve.org/CVERecord?id=CVE-2023-52501"},{"name":"CVE-2023-52447","url":"https://www.cve.org/CVERecord?id=CVE-2023-52447"},{"name":"CVE-2023-52504","url":"https://www.cve.org/CVERecord?id=CVE-2023-52504"},{"name":"CVE-2023-52513","url":"https://www.cve.org/CVERecord?id=CVE-2023-52513"},{"name":"CVE-2023-52615","url":"https://www.cve.org/CVERecord?id=CVE-2023-52615"},{"name":"CVE-2021-47105","url":"https://www.cve.org/CVERecord?id=CVE-2021-47105"},{"name":"CVE-2023-52511","url":"https://www.cve.org/CVERecord?id=CVE-2023-52511"},{"name":"CVE-2023-4881","url":"https://www.cve.org/CVERecord?id=CVE-2023-4881"},{"name":"CVE-2023-52606","url":"https://www.cve.org/CVERecord?id=CVE-2023-52606"},{"name":"CVE-2023-52502","url":"https://www.cve.org/CVERecord?id=CVE-2023-52502"},{"name":"CVE-2024-26667","url":"https://www.cve.org/CVERecord?id=CVE-2024-26667"},{"name":"CVE-2023-7192","url":"https://www.cve.org/CVERecord?id=CVE-2023-7192"},{"name":"CVE-2023-52597","url":"https://www.cve.org/CVERecord?id=CVE-2023-52597"},{"name":"CVE-2023-52531","url":"https://www.cve.org/CVERecord?id=CVE-2023-52531"},{"name":"CVE-2024-26717","url":"https://www.cve.org/CVERecord?id=CVE-2024-26717"},{"name":"CVE-2023-52566","url":"https://www.cve.org/CVERecord?id=CVE-2023-52566"},{"name":"CVE-2024-0565","url":"https://www.cve.org/CVERecord?id=CVE-2024-0565"},{"name":"CVE-2024-2201","url":"https://www.cve.org/CVERecord?id=CVE-2024-2201"},{"name":"CVE-2021-47101","url":"https://www.cve.org/CVERecord?id=CVE-2021-47101"},{"name":"CVE-2023-52476","url":"https://www.cve.org/CVERecord?id=CVE-2023-52476"},{"name":"CVE-2023-52463","url":"https://www.cve.org/CVERecord?id=CVE-2023-52463"},{"name":"CVE-2023-52467","url":"https://www.cve.org/CVERecord?id=CVE-2023-52467"},{"name":"CVE-2023-52628","url":"https://www.cve.org/CVERecord?id=CVE-2023-52628"},{"name":"CVE-2023-52529","url":"https://www.cve.org/CVERecord?id=CVE-2023-52529"},{"name":"CVE-2023-52591","url":"https://www.cve.org/CVERecord?id=CVE-2023-52591"},{"name":"CVE-2023-52530","url":"https://www.cve.org/CVERecord?id=CVE-2023-52530"},{"name":"CVE-2023-52520","url":"https://www.cve.org/CVERecord?id=CVE-2023-52520"},{"name":"CVE-2021-47107","url":"https://www.cve.org/CVERecord?id=CVE-2021-47107"},{"name":"CVE-2023-52523","url":"https://www.cve.org/CVERecord?id=CVE-2023-52523"},{"name":"CVE-2024-26664","url":"https://www.cve.org/CVERecord?id=CVE-2024-26664"},{"name":"CVE-2023-52494","url":"https://www.cve.org/CVERecord?id=CVE-2023-52494"},{"name":"CVE-2023-52576","url":"https://www.cve.org/CVERecord?id=CVE-2023-52576"},{"name":"CVE-2024-26612","url":"https://www.cve.org/CVERecord?id=CVE-2024-26612"},{"name":"CVE-2023-52474","url":"https://www.cve.org/CVERecord?id=CVE-2023-52474"},{"name":"CVE-2021-46930","url":"https://www.cve.org/CVERecord?id=CVE-2021-46930"},{"name":"CVE-2023-52607","url":"https://www.cve.org/CVERecord?id=CVE-2023-52607"},{"name":"CVE-2022-48628","url":"https://www.cve.org/CVERecord?id=CVE-2022-48628"},{"name":"CVE-2023-52564","url":"https://www.cve.org/CVERecord?id=CVE-2023-52564"}],"links":[],"reference":"CERTFR-2024-AVI-0329","revisions":[{"description":"Version initiale","revision_date":"2024-04-19T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans <span\nclass=\"textit\">le noyau Linux de SUSE</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l'\u00e9diteur, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241280-1 du 12 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241280-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241257-1 du 12 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241257-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241321-1 du 16 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241321-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241299-1 du 15 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241299-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241332-2 du 18 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241332-2"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241278-1 du 12 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241278-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241298-1 du 15 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241298-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241274-1 du 12 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241274-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241275-1 du 12 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241275-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241322-2 du 18 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241322-2"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241322-1 du 16 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241322-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241320-1 du 16 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241320-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241288-1 du 15 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241288-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241276-1 du 12 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241276-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241273-1 du 12 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241273-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241292-1 du 15 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241292-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241332-1 du 18 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241332-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241312-1 du 16 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241312-1"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20241318-1 du 16 avril 2024","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241318-1"}]}
