Inappropriate use of JIT optimisation in V8 in Google Chrome prior to 61.0.3163.100 for Linux, Windows, and Mac allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page, related to the escape analysis phase.Referenceshttp://www.securityfocus.com/bid/100947https://security.gentoo.org/glsa/201709-25https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop_21.htmlhttps://blogs.technet.microsoft.com/mmpc/2017/10/18/browser-security-beyond-sandboxing/https://access.redhat.com/errata/RHSA-2017:2792http://www.securitytracker.com/id/1039497https://crbug.com/765433http://www.debian.org/security/2017/dsa-3985