Project Subscriptions
| Vendors | Products |
|---|---|
|
Postgresql
Subscribe
|
Postgresql
Subscribe
|
|
Redhat
Subscribe
|
Advanced Cluster Security
Subscribe
Codeready Linux Builder Eus
Subscribe
Codeready Linux Builder Eus For Power Little Endian Eus
Subscribe
Codeready Linux Builder For Arm64 Eus
Subscribe
Codeready Linux Builder For Ibm Z Systems Eus
Subscribe
Codeready Linux Builder For Power Little Endian Eus
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Arm 64
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Software Collections
Subscribe
Rhel Tus
Subscribe
Software Collections
Subscribe
|
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3651-1 | postgresql-11 security update |
Debian DSA |
DSA-5553-1 | postgresql-15 security update |
Debian DSA |
DSA-5554-1 | postgresql-13 security update |
EUVD |
EUVD-2023-58144 | A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack. |
Ubuntu USN |
USN-6538-1 | PostgreSQL vulnerabilities |
Ubuntu USN |
USN-6538-2 | PostgreSQL vulnerabilities |
Ubuntu USN |
USN-6570-1 | PostgreSQL vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 25 Oct 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:9 |
Sat, 04 Oct 2025 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs |
Mon, 02 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 14 Sep 2024 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-02-02T13:46:14.730Z
Reserved: 2023-10-31T03:56:58.366Z
Link: CVE-2023-5870
Updated: 2025-11-04T19:25:52.585Z
Status : Modified
Published: 2023-12-10T18:15:07.643
Modified: 2025-11-04T20:17:14.013
Link: CVE-2023-5870
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN