Integer overflow in the FontData::Bound function in data/font_data.cc in Google sfntly, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted offset or length value within font data in an SFNT container.
{
"binaries": [
{
"binary_version": "47.0.2526.73-0ubuntu0.14.04.1.1106",
"binary_name": "chromium-browser"
},
{
"binary_version": "47.0.2526.73-0ubuntu0.14.04.1.1106",
"binary_name": "chromium-browser-l10n"
},
{
"binary_version": "47.0.2526.73-0ubuntu0.14.04.1.1106",
"binary_name": "chromium-chromedriver"
},
{
"binary_version": "47.0.2526.73-0ubuntu0.14.04.1.1106",
"binary_name": "chromium-codecs-ffmpeg"
},
{
"binary_version": "47.0.2526.73-0ubuntu0.14.04.1.1106",
"binary_name": "chromium-codecs-ffmpeg-extra"
}
],
"availability": "No subscription required"
}