First published: Tue Oct 31 2023(Updated: )
A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/PostgreSQL | <16.1 | 16.1 |
redhat/PostgreSQL | <15.5 | 15.5 |
redhat/PostgreSQL | <14.10 | 14.10 |
redhat/PostgreSQL | <13.13 | 13.13 |
redhat/PostgreSQL | <12.17 | 12.17 |
redhat/PostgreSQL | <11.22 | 11.22 |
debian/postgresql-13 | 13.16-0+deb11u1 | |
debian/postgresql-15 | 15.8-0+deb12u1 | |
debian/postgresql-16 | 16.4-1 | |
IBM InfoSphere Guardium z/OS | <=11.3 | |
IBM InfoSphere Guardium z/OS | <=11.4 | |
IBM InfoSphere Guardium z/OS | <=11.5 | |
IBM InfoSphere Guardium z/OS | <=12.0 | |
PostgreSQL JDBC Driver | >=11.0<11.22 | |
PostgreSQL JDBC Driver | >=12.0<12.17 | |
PostgreSQL JDBC Driver | >=13.0<13.13 | |
PostgreSQL JDBC Driver | >=14.0<14.10 | |
PostgreSQL JDBC Driver | >=15.0<15.5 | |
PostgreSQL JDBC Driver | =16.0 | |
redhat codeready linux builder eus | =9.2 | |
redhat codeready Linux builder eus for power little endian eus | =9.0_ppc64le | |
redhat codeready Linux builder eus for power little endian eus | =9.2_ppc64le | |
redhat codeready linux builder for arm64 eus | =8.6_aarch64 | |
redhat codeready linux builder for arm64 eus | =9.0_aarch64 | |
redhat codeready linux builder for arm64 eus | =9.2_aarch64 | |
redhat codeready linux builder for ibm z systems eus | =9.0_s390x | |
redhat codeready linux builder for ibm z systems eus | =9.2_s390x | |
redhat codeready linux builder for power little endian eus | =9.0_ppc64le | |
redhat codeready linux builder for power little endian eus | =9.2_ppc64le | |
redhat software collections | =1.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
redhat enterprise Linux eus | =8.6 | |
redhat enterprise Linux eus | =8.8 | |
redhat enterprise Linux eus | =9.0 | |
redhat enterprise Linux eus | =9.2 | |
redhat enterprise Linux for arm 64 | =8.0 | |
redhat enterprise Linux for arm 64 | =8.8_aarch64 | |
redhat enterprise Linux for ibm z systems | =8.0_s390x | |
redhat enterprise Linux for ibm z systems eus | =8.6_s390x | |
redhat enterprise Linux for ibm z systems eus | =8.8_s390x | |
redhat enterprise Linux for ibm z systems eus | =9.0_s390x | |
redhat enterprise Linux for ibm z systems eus | =9.2_s390x | |
redhat enterprise Linux for power little endian | =8.0_ppc64le | |
redhat enterprise Linux for power little endian eus | =8.6_ppc64le | |
redhat enterprise Linux for power little endian eus | =8.8_ppc64le | |
redhat enterprise Linux for power little endian eus | =9.0_ppc64le | |
redhat enterprise Linux for power little endian eus | =9.2_ppc64le | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server aus | =8.4 | |
redhat enterprise Linux server aus | =8.6 | |
redhat enterprise Linux server aus | =9.2 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server tus | =8.4 | |
redhat enterprise Linux server tus | =8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5870 is low.
You can update your PostgreSQL package to version 16.1 or apply the appropriate security updates for your specific version.
You can find more information about CVE-2023-5870 at the following references: [link1], [link2], [link3].