{"id":"CVE-2019-10129","details":"A vulnerability was found in postgresql versions 11.x prior to 11.3. Using a purpose-crafted insert to a partitioned table, an attacker can read arbitrary bytes of server memory. In the default configuration, any user can create a partitioned table suitable for this attack. (Exploit prerequisites are the same as for CVE-2018-1052).","modified":"2026-04-16T04:35:29.892353219Z","published":"2019-07-30T17:15:12.263Z","related":["openSUSE-SU-2024:11185-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-03"},{"type":"ADVISORY","url":"https://www.postgresql.org/about/news/1939/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10129"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"11.0"},{"fixed":"11.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10129.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}