vulnerability
Rocky Linux: CVE-2023-5870: postgresql-15 (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:M/C:N/I:N/A:C) | Dec 10, 2023 | Mar 5, 2024 | Jan 28, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:M/C:N/I:N/A:C)
Published
Dec 10, 2023
Added
Mar 5, 2024
Modified
Jan 28, 2025
Description
A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.
Solution(s)
rocky-upgrade-pg_repackrocky-upgrade-pg_repack-debuginforocky-upgrade-pg_repack-debugsourcerocky-upgrade-pgauditrocky-upgrade-pgaudit-debuginforocky-upgrade-pgaudit-debugsourcerocky-upgrade-postgres-decoderbufsrocky-upgrade-postgres-decoderbufs-debuginforocky-upgrade-postgres-decoderbufs-debugsourcerocky-upgrade-postgresqlrocky-upgrade-postgresql-contribrocky-upgrade-postgresql-contrib-debuginforocky-upgrade-postgresql-debuginforocky-upgrade-postgresql-debugsourcerocky-upgrade-postgresql-docsrocky-upgrade-postgresql-docs-debuginforocky-upgrade-postgresql-plperlrocky-upgrade-postgresql-plperl-debuginforocky-upgrade-postgresql-plpython3rocky-upgrade-postgresql-plpython3-debuginforocky-upgrade-postgresql-pltclrocky-upgrade-postgresql-pltcl-debuginforocky-upgrade-postgresql-serverrocky-upgrade-postgresql-server-debuginforocky-upgrade-postgresql-server-develrocky-upgrade-postgresql-server-devel-debuginforocky-upgrade-postgresql-staticrocky-upgrade-postgresql-testrocky-upgrade-postgresql-test-debuginforocky-upgrade-postgresql-upgraderocky-upgrade-postgresql-upgrade-debuginforocky-upgrade-postgresql-upgrade-develrocky-upgrade-postgresql-upgrade-devel-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.