Project Subscriptions
| Vendors | Products |
|---|---|
|
Postgresql
Subscribe
|
Postgresql
Subscribe
|
|
Redhat
Subscribe
|
Advanced Cluster Security
Subscribe
Codeready Linux Builder Eus
Subscribe
Codeready Linux Builder Eus For Power Little Endian Eus
Subscribe
Codeready Linux Builder For Arm64 Eus
Subscribe
Codeready Linux Builder For Ibm Z Systems Eus
Subscribe
Codeready Linux Builder For Power Little Endian Eus
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Arm 64
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Power Big Endian
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux For Scientific Computing
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Software Collections
Subscribe
Rhel Tus
Subscribe
Software Collections
Subscribe
|
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3651-1 | postgresql-11 security update |
Debian DSA |
DSA-5553-1 | postgresql-15 security update |
Debian DSA |
DSA-5554-1 | postgresql-13 security update |
EUVD |
EUVD-2023-58143 | A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory. |
Ubuntu USN |
USN-6538-1 | PostgreSQL vulnerabilities |
Ubuntu USN |
USN-6538-2 | PostgreSQL vulnerabilities |
Ubuntu USN |
USN-6570-1 | PostgreSQL vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 25 Oct 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:9 |
Sat, 04 Oct 2025 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs |
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 14 Sep 2024 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-06T20:51:34.742Z
Reserved: 2023-10-31T03:56:42.638Z
Link: CVE-2023-5869
No data.
Status : Modified
Published: 2023-12-10T18:15:07.410
Modified: 2025-11-04T20:17:13.783
Link: CVE-2023-5869
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN