The DecodeHSTSPreloadRaw function in net/http/transport_security_state.cc in Google Chrome before 43.0.2357.130 does not properly canonicalize DNS hostnames before making comparisons to HSTS or HPKP preload entries, which allows remote attackers to bypass intended access restrictions via a string that (1) ends in a . (dot) character or (2) is not entirely lowercase.
https://security.gentoo.org/glsa/201507-18
https://codereview.chromium.org/1149753002
https://code.google.com/p/chromium/issues/detail?id=461481
http://www.ubuntu.com/usn/USN-2652-1
http://www.securitytracker.com/id/1032731
http://www.securityfocus.com/bid/75336
http://www.debian.org/security/2015/dsa-3315
http://rhn.redhat.com/errata/RHSA-2015-1188.html
http://lists.opensuse.org/opensuse-updates/2015-11/msg00012.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00057.html
http://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html