CVE Vulnerabilities

CVE-2019-13751

Use of Uninitialized Resource

Published: Dec 10, 2019 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.

Weakness

The product uses or accesses a resource that has not been initialized.

Affected Software

NameVendorStart VersionEnd Version
ChromeGoogle*79.0.3945.79 (excluding)
Red Hat Enterprise Linux 6 SupplementaryRedHatchromium-browser-0:79.0.3945.79-1.el6_10*
Red Hat Enterprise Linux 8RedHatsqlite-0:3.26.0-15.el8*
Red Hat Enterprise Linux 8RedHatsqlite-0:3.26.0-15.el8*
Chromium-browserUbuntubionic*
Chromium-browserUbuntudevel*
Chromium-browserUbuntudisco*
Chromium-browserUbuntueoan*
Chromium-browserUbuntuesm-apps/noble*
Chromium-browserUbuntufocal*
Chromium-browserUbuntugroovy*
Chromium-browserUbuntuhirsute*
Chromium-browserUbuntuimpish*
Chromium-browserUbuntujammy*
Chromium-browserUbuntukinetic*
Chromium-browserUbuntulunar*
Chromium-browserUbuntumantic*
Chromium-browserUbuntunoble*
Chromium-browserUbuntuoracular*
Chromium-browserUbuntuplucky*
Chromium-browserUbuntuquesting*
Chromium-browserUbuntutrusty*
Chromium-browserUbuntuupstream*
Chromium-browserUbuntuxenial*
SqliteUbuntubionic*
SqliteUbuntudisco*
SqliteUbuntueoan*
SqliteUbuntufocal*
SqliteUbuntugroovy*
SqliteUbuntuhirsute*
SqliteUbuntuimpish*
SqliteUbuntukinetic*
SqliteUbuntutrusty*
SqliteUbuntutrusty/esm*
SqliteUbuntuupstream*
SqliteUbuntuxenial*
Sqlite3Ubuntubionic*
Sqlite3Ubuntudisco*
Sqlite3Ubuntueoan*
Sqlite3Ubuntuesm-infra-legacy/trusty*
Sqlite3Ubuntuesm-infra/bionic*
Sqlite3Ubuntuesm-infra/xenial*
Sqlite3Ubuntuprecise/esm*
Sqlite3Ubuntutrusty*
Sqlite3Ubuntutrusty/esm*
Sqlite3Ubuntuxenial*

Potential Mitigations

References