Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.Referenceshttp://www.securityfocus.com/bid/106767https://access.redhat.com/errata/RHSA-2019:0309https://www.debian.org/security/2019/dsa-4395https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.htmlhttps://crbug.com/912074https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/