Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
https://www.debian.org/security/2019/dsa-4451
https://seclists.org/bugtraq/2019/May/67
https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html
https://usn.ubuntu.com/3997-1/
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html
https://access.redhat.com/errata/RHSA-2019:1310
https://access.redhat.com/errata/RHSA-2019:1309
https://access.redhat.com/errata/RHSA-2019:1308
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html
Source: MITRE
Published: 2019-05-23
Updated: 2022-10-11
Type: CWE-125
Base Score: 4.3
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact Score: 2.9
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Impact Score: 3.6
Exploitability Score: 2.8
Severity: MEDIUM