The raw details:
* The v8 engine uses a common dtoa() implementation to parse strings into floating point numbers. We have applied a patch to fix a recent bug in this component.
* Severity: High. An attacker might be able to run arbitrary code within the Google Chrome sandbox.
[All of article.]
The link for this article located at Threat Post is no longer available.