Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data.
https://security.gentoo.org/glsa/201506-04
https://codereview.chromium.org/1106303002
https://code.google.com/p/chromium/issues/detail?id=450939
http://www.securitytracker.com/id/1032375
http://www.securityfocus.com/bid/74723
http://www.debian.org/security/2015/dsa-3267
http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html
http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167428.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166975.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168803.html
http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html