Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 8.0 | |
chrome | le | 42.0.2311.152 |
lists.opensuse.org/opensuse-updates/2015-05/msg00091.html
lists.opensuse.org/opensuse-updates/2015-11/msg00015.html
www.debian.org/security/2015/dsa-3267
www.securityfocus.com/bid/74723
www.securitytracker.com/id/1032375
code.google.com/p/chromium/issues/detail?id=450939
codereview.chromium.org/1106303002
googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html
lists.fedoraproject.org/pipermail/package-announce/2015-October/168803.html
lists.fedoraproject.org/pipermail/package-announce/2015-September/166975.html
lists.fedoraproject.org/pipermail/package-announce/2015-September/167428.html
security.gentoo.org/glsa/201506-04