{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<P>Versions ant\u00e9rieures \u00e0 Google Chrome 18.0.1025.151.</P>","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2011-3070","url":"https://www.cve.org/CVERecord?id=CVE-2011-3070"},{"name":"CVE-2011-3068","url":"https://www.cve.org/CVERecord?id=CVE-2011-3068"},{"name":"CVE-2011-3069","url":"https://www.cve.org/CVERecord?id=CVE-2011-3069"},{"name":"CVE-2011-3066","url":"https://www.cve.org/CVERecord?id=CVE-2011-3066"},{"name":"CVE-2011-3077","url":"https://www.cve.org/CVERecord?id=CVE-2011-3077"},{"name":"CVE-2011-3073","url":"https://www.cve.org/CVERecord?id=CVE-2011-3073"},{"name":"CVE-2011-3076","url":"https://www.cve.org/CVERecord?id=CVE-2011-3076"},{"name":"CVE-2011-3074","url":"https://www.cve.org/CVERecord?id=CVE-2011-3074"},{"name":"CVE-2011-3075","url":"https://www.cve.org/CVERecord?id=CVE-2011-3075"},{"name":"CVE-2011-3071","url":"https://www.cve.org/CVERecord?id=CVE-2011-3071"},{"name":"CVE-2011-3072","url":"https://www.cve.org/CVERecord?id=CVE-2011-3072"},{"name":"CVE-2011-3067","url":"https://www.cve.org/CVERecord?id=CVE-2011-3067"}],"links":[{"title":"Note de version Google Chrome    2012/04/stable-and-beta-channel-updates du 05 avril 2012 :","url":"http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html"}],"reference":"CERTA-2012-AVI-197","revisions":[{"description":"version initiale.","revision_date":"2012-04-10T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"Douze vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span class=\"textit\">Google\nChrome</span>. Trois types de vuln\u00e9rabilit\u00e9s sont pr\u00e9sents. Le premier\nest une utilisation de donn\u00e9es apr\u00e8s la lib\u00e9ration de l'espace m\u00e9moire\n(<span class=\"textit\">use after free</span>), il concerne huit des\nvuln\u00e9rabilit\u00e9s. Le deuxi\u00e8me permet de lire des donn\u00e9es dans une zone non\nautoris\u00e9e, il concerne deux des vuln\u00e9rabilit\u00e9s. Le dernier contourne les\ncloisonnements d'informations appel\u00e9s \u00ab <span\nclass=\"textit\">Cross-origin</span> \u00bb, deux vuln\u00e9rabilit\u00e9s sont\nconcern\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Google Chrome du 05 avril 2012","url":null}]}
