An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
https://www.debian.org/security/2019/dsa-4392
https://www.debian.org/security/2019/dsa-4391
https://www.debian.org/security/2018/dsa-4352
https://usn.ubuntu.com/3897-1/
https://usn.ubuntu.com/3896-1/
https://security.gentoo.org/glsa/201908-18
https://security.gentoo.org/glsa/201904-07
https://security.gentoo.org/glsa/201903-04
https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00023.html
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
https://access.redhat.com/errata/RHSA-2019:1144
https://access.redhat.com/errata/RHSA-2019:0374
https://access.redhat.com/errata/RHSA-2019:0373
https://access.redhat.com/errata/RHSA-2018:3803
http://www.securityfocus.com/bid/106084
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html