First published: Tue Dec 10 2019(Updated: )
An out of bounds read flaw was found in the SQLite component of the Chromium browser. Upstream bug(s): <a href="https://code.google.com/p/chromium/issues/detail?id=1025470">https://code.google.com/p/chromium/issues/detail?id=1025470</a> External References: <a href="https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html</a>
Credit: chrome-cve-admin@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <79.0.3945.79 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux For Scientific Computing | =6.0 | |
Redhat Enterprise Linux For Scientific Computing | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
redhat/chromium-browser | <79.0.3945.79 | 79.0.3945.79 |
debian/chromium | 120.0.6099.224-1~deb11u1 128.0.6613.84-1~deb12u1 129.0.6668.100-1~deb12u1 129.0.6668.89-1 129.0.6668.100-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13752 is an out of bounds read vulnerability in SQLite in Google Chrome prior to version 79.0.3945.79.
CVE-2019-13752 allows a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
CVE-2019-13752 has a severity rating of 6.5 (medium).
To fix CVE-2019-13752, update Google Chrome to version 79.0.3945.79 or later.
You can find more information about CVE-2019-13752 at the following references: [link1] [link2] [link3].