Inappropriate use of JIT optimisation in V8 in Google Chrome prior to 61.0.3163.100 for Linux, Windows, and Mac allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page, related to the escape analysis phase.
[
{
"product": "Google Chrome prior to 61.0.3163.100 for Linux, Windows and Mac",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Google Chrome prior to 61.0.3163.100 for Linux, Windows and Mac"
}
]
}
]
www.debian.org/security/2017/dsa-3985
www.securityfocus.com/bid/100947
www.securitytracker.com/id/1039497
access.redhat.com/errata/RHSA-2017:2792
blogs.technet.microsoft.com/mmpc/2017/10/18/browser-security-beyond-sandboxing/
chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop_21.html
crbug.com/765433
security.gentoo.org/glsa/201709-25