Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page.
https://security.gentoo.org/glsa/201705-02
https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html
https://access.redhat.com/errata/RHSA-2017:1124