First published: Tue Dec 10 2019(Updated: )
An incorrect security ui flaw was found in the printing component of the Chromium browser. Upstream bug(s): <a href="https://code.google.com/p/chromium/issues/detail?id=708595">https://code.google.com/p/chromium/issues/detail?id=708595</a> External References: <a href="https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html</a>
Credit: chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <79.0.3945.79 | 79.0.3945.79 |
Google Chrome | <79.0.3945.79 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux For Scientific Computing | =6.0 | |
Redhat Enterprise Linux For Scientific Computing | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
debian/chromium | 90.0.4430.212-1~deb10u1 116.0.5845.180-1~deb11u1 120.0.6099.129-1~deb11u1 119.0.6045.199-1~deb12u1 120.0.6099.129-1~deb12u1 120.0.6099.129-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-13756.
The affected software includes Google Chrome prior to version 79.0.3945.79, Debian Linux 9.0 and 10.0, Fedora 30 and 31, Redhat Enterprise Linux Desktop 6.0, Redhat Enterprise Linux For Scientific Computing 6.0, Redhat Enterprise Linux Server 6.0, and Redhat Enterprise Linux Workstation 6.0.
The severity level of this vulnerability is medium with a CVSS score of 4.3.
The CVE reference for this vulnerability is CVE-2019-13756.
To fix this vulnerability, update Google Chrome to version 79.0.3945.79 or later, or apply the relevant patches provided by the respective software vendors.