Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
https://www.debian.org/security/2021/dsa-4824
https://www.debian.org/security/2020/dsa-4740
https://www.debian.org/security/2020/dsa-4736
https://usn.ubuntu.com/4443-1/
https://support.apple.com/kb/HT211292
https://support.apple.com/kb/HT211291
https://support.apple.com/kb/HT211290
https://support.apple.com/kb/HT211288
https://security.gentoo.org/glsa/202101-30
https://security.gentoo.org/glsa/202007-64
https://security.gentoo.org/glsa/202007-08
https://lists.debian.org/debian-lts-announce/2020/08/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00027.html
https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
http://packetstormsecurity.com/files/158697/WebRTC-usrsctp-Incorrect-Call.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html