An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html
http://www.securityfocus.com/bid/106084
https://access.redhat.com/errata/RHSA-2018:3803
https://access.redhat.com/errata/RHSA-2019:0373
https://access.redhat.com/errata/RHSA-2019:0374
https://access.redhat.com/errata/RHSA-2019:1144
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00023.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html
https://security.gentoo.org/glsa/201903-04
https://security.gentoo.org/glsa/201904-07
https://security.gentoo.org/glsa/201908-18
https://usn.ubuntu.com/3896-1/
https://usn.ubuntu.com/3897-1/
https://www.debian.org/security/2018/dsa-4352
Source: MITRE
Published: 2018-12-11
Updated: 2020-08-24
Type: CWE-787
Base Score: 6.8
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 2.8
Severity: HIGH