WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a <ruby>><table><rt> sequence.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14094
https://exchange.xforce.ibmcloud.com/vulnerabilities/56214
https://bugs.webkit.org/show_bug.cgi?id=33266
http://www.vupen.com/english/advisories/2011/0552
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2010/2722
http://www.vupen.com/english/advisories/2010/0361
http://www.ubuntu.com/usn/USN-1006-1
http://www.securityfocus.com/bid/38177
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
http://trac.webkit.org/changeset/53525
http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs
http://securitytracker.com/id?1023583
http://secunia.com/advisories/43068
http://secunia.com/advisories/41856
http://secunia.com/advisories/38545
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html