A vulnerability was found in postgresql versions 11.x prior to 11.3. Using a purpose-crafted insert to a partitioned table, an attacker can read arbitrary bytes of server memory. In the default configuration, any user can create a partitioned table suitable for this attack. (Exploit prerequisites are the same as for CVE-2018-1052).
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10129 | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/202003-03 | Third Party Advisory |
https://www.postgresql.org/about/news/1939/ | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10129 | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/202003-03 | Third Party Advisory |
https://www.postgresql.org/about/news/1939/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10129 - Issue Tracking, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202003-03 - Third Party Advisory | |
References | () https://www.postgresql.org/about/news/1939/ - Vendor Advisory |
Information
Published : 2019-07-30 17:15
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10129
Mitre link : CVE-2019-10129
CVE.ORG link : CVE-2019-10129
JSON object : View
Products Affected
postgresql
- postgresql
CWE
CWE-125
Out-of-bounds Read