Some of these security holes can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system, according to this Secunia advisory.Secunia rates this a "highly critical" update.
According to this basic documentation, there are a total of 11 vulnerabilities in this patch batch. Google is withholding details on most of the serious vulnerabilities until the majority of Chrome users are fully patches.
Here's what we know:
-   (Medium-risk) Possible autofill / autocomplete profile spamming.
-  (High-risk) Crash with forms.
-  (Critical) Browser crash with form autofill. Credit to the Chromium development community.
-  (High-risk) Possible URL spoofing on page unload.
-  (Low-risk) Pop-up block bypass.
-  (Medium-risk) Crash on shutdown with Web Sockets. [Linux only]  (Low-risk) Bad construction of PATH variable.
-  (High-risk) Possible memory corruption with animated GIF. Credit to Simon Schaak.
- [Linux only]  (High-risk) Failure to sandbox worker processes on Linux.
-  (High-risk) Stale elements in an element map.