CWE
686
EPSS
0.180%
Advisory Published
CVE Published
CVE Published
Updated

CVE-2023-5868: Postgresql: memory disclosure in aggregate function calls

First published: Tue Oct 31 2023(Updated: )

A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/PostgreSQL<16.1
16.1
redhat/PostgreSQL<15.5
15.5
redhat/PostgreSQL<14.10
14.10
redhat/PostgreSQL<13.13
13.13
redhat/PostgreSQL<12.17
12.17
redhat/PostgreSQL<11.22
11.22
ubuntu/postgresql-10<10.23-0ubuntu0.18.04.2+
10.23-0ubuntu0.18.04.2+
ubuntu/postgresql-12<12.17-0ubuntu0.20.04.1
12.17-0ubuntu0.20.04.1
ubuntu/postgresql-12<12.17
12.17
ubuntu/postgresql-14<14.10-0ubuntu0.22.04.1
14.10-0ubuntu0.22.04.1
ubuntu/postgresql-14<14.10
14.10
ubuntu/postgresql-15<15.5-0ubuntu0.23.04.1
15.5-0ubuntu0.23.04.1
ubuntu/postgresql-15<15.5-0ubuntu0.23.10.1
15.5-0ubuntu0.23.10.1
ubuntu/postgresql-15<15.5
15.5
ubuntu/postgresql-16<16.1
16.1
debian/postgresql-13
13.16-0+deb11u1
debian/postgresql-15
15.8-0+deb12u1
debian/postgresql-16
16.4-1
PostgreSQL Common>=11.0<11.22
PostgreSQL Common>=12.0<12.17
PostgreSQL Common>=13.0<13.13
PostgreSQL Common>=14.0<14.10
PostgreSQL Common>=15.0<15.5
PostgreSQL Common=16.0
Red Hat CodeReady Linux Builder=9.2
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support=9.0_ppc64le
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support=9.2_ppc64le
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support=8.6_aarch64
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support=9.0_aarch64
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support=9.2_aarch64
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support=9.0_s390x
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support=9.2_s390x
Red Hat CodeReady Linux Builder for Power, little endian=9.0_ppc64le
Red Hat CodeReady Linux Builder for Power, little endian=9.2_ppc64le
Red Hat Software Collections=1.0
Red Hat Enterprise Linux=8.0
Red Hat Enterprise Linux=9.0
Red Hat Enterprise Linux Server EUS=8.6
Red Hat Enterprise Linux Server EUS=8.8
Red Hat Enterprise Linux Server EUS=9.0
Red Hat Enterprise Linux Server EUS=9.2
Red Hat Enterprise Linux=8.0
Red Hat Enterprise Linux=8.8_aarch64
Red Hat Enterprise Linux for IBM Z Systems=8.0_s390x
Red Hat Enterprise Linux for IBM Z Systems (s390x)=8.6_s390x
Red Hat Enterprise Linux for IBM Z Systems (s390x)=8.8_s390x
Red Hat Enterprise Linux for IBM Z Systems (s390x)=9.0_s390x
Red Hat Enterprise Linux for IBM Z Systems (s390x)=9.2_s390x
Red Hat Enterprise Linux for Power, little endian=8.0_ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Update Support=8.6_ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Update Support=8.8_ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Update Support=9.0_ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Update Support=9.2_ppc64le
Red Hat Enterprise Linux Server=8.2
Red Hat Enterprise Linux Server=8.4
Red Hat Enterprise Linux Server=8.6
Red Hat Enterprise Linux Server=9.2
Red Hat Enterprise Linux Server=8.2
Red Hat Enterprise Linux Server=8.4
Red Hat Enterprise Linux Server=8.6

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2023-5868?

    CVE-2023-5868 is a vulnerability that allows memory disclosure in aggregate function calls.

  • Which software is affected by CVE-2023-5868?

    The software affected by CVE-2023-5868 includes PostgreSQL versions 11.16-0+deb10u1, 13.11-0+deb11u1, 15.3-0+deb12u1, 16.1-1, and Red Hat PostgreSQL versions 16.1, 15.5, 14.10, 13.13, 12.17, and 11.22. It also affects Ubuntu PostgreSQL versions 14.10-0ubuntu0.22.04.1, 14.10, 12.17-0ubuntu0.20.04.1, 12.17, 15.5, 15.5-0ubuntu0.23.04.1, and 15.5-0ubuntu0.23.10.1.

  • What is the severity of CVE-2023-5868?

    CVE-2023-5868 has a severity level of medium.

  • How can I fix the CVE-2023-5868 vulnerability?

    To fix the CVE-2023-5868 vulnerability, you should update your PostgreSQL installation to a version that includes the necessary security patches. Please refer to the official PostgreSQL website and your OS package manager for the latest updates and instructions.

  • Where can I find more information about CVE-2023-5868?

    You can find more information about CVE-2023-5868 on the official PostgreSQL website, the Debian Security Tracker, and the provided references.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203