chromium is vulnerable to arbitrary code execution. Sharing of objects over calls into JavaScript runtime in allows a remote attacker to potentially exploit heap corruption via a malicious PDF file.
www.securityfocus.com/bid/106767
access.redhat.com/errata/RHSA-2019:0309
chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
crbug.com/908292
lists.fedoraproject.org/archives/list/[email protected]/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
lists.fedoraproject.org/archives/list/[email protected]/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
security-tracker.debian.org/tracker/CVE-2019-5772
www.debian.org/security/2019/dsa-4395