Description
A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.
Published: 2023-12-10
Score: 2.2 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3651-1 postgresql-11 security update
Debian DSA Debian DSA DSA-5553-1 postgresql-15 security update
Debian DSA Debian DSA DSA-5554-1 postgresql-13 security update
EUVD EUVD EUVD-2023-58144 A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.
Ubuntu USN Ubuntu USN USN-6538-1 PostgreSQL vulnerabilities
Ubuntu USN Ubuntu USN USN-6538-2 PostgreSQL vulnerabilities
Ubuntu USN Ubuntu USN USN-6570-1 PostgreSQL vulnerabilities
References
Link Providers
https://access.redhat.com/errata/RHSA-2023:7545 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7579 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7580 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7581 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7616 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7656 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7666 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7667 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7694 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7695 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7714 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7770 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7772 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7784 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7785 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7883 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7884 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7885 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0304 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0332 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0337 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2023-5870 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2247170 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2023/11/msg00007.html cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2023-5870 cve-icon
https://security.netapp.com/advisory/ntap-20240119-0003/ cve-icon
https://www.cve.org/CVERecord?id=CVE-2023-5870 cve-icon
https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/ cve-icon cve-icon cve-icon
https://www.postgresql.org/support/security/CVE-2023-5870/ cve-icon cve-icon cve-icon
History

Tue, 04 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Sat, 25 Oct 2025 01:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:9

Sat, 04 Oct 2025 01:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:9

Mon, 02 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Sat, 14 Sep 2024 00:45:00 +0000

Type Values Removed Values Added
References

Subscriptions

Postgresql Postgresql
Redhat Advanced Cluster Security Codeready Linux Builder Eus Codeready Linux Builder Eus For Power Little Endian Eus Codeready Linux Builder For Arm64 Eus Codeready Linux Builder For Ibm Z Systems Eus Codeready Linux Builder For Power Little Endian Eus Enterprise Linux Enterprise Linux Eus Enterprise Linux For Arm 64 Enterprise Linux For Ibm Z Systems Enterprise Linux For Ibm Z Systems Eus Enterprise Linux For Power Little Endian Enterprise Linux For Power Little Endian Eus Enterprise Linux Server Aus Enterprise Linux Server Tus Rhel Aus Rhel E4s Rhel Eus Rhel Software Collections Rhel Tus Software Collections
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-02T17:25:57.356Z

Reserved: 2023-10-31T03:56:58.366Z

Link: CVE-2023-5870

cve-icon Vulnrichment

Updated: 2025-11-04T19:25:52.585Z

cve-icon NVD

Status : Modified

Published: 2023-12-10T18:15:07.643

Modified: 2025-11-04T20:17:14.013

Link: CVE-2023-5870

cve-icon Redhat

Severity : Low

Publid Date: 2023-11-09T00:00:00Z

Links: CVE-2023-5870 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses