CVE-2023-5870 Affecting postgresql-upgrade package, versions <0:12.17-1.module+el8.9.0+1603+444d1b54


Severity

Recommended
high

Based on Rocky Linux security rating.

Threat Intelligence

EPSS
0.19% (57th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ROCKY8-POSTGRESQLUPGRADE-6102256
  • published7 Dec 2023
  • disclosed10 Dec 2023

Introduced: 7 Dec 2023

CVE-2023-5870  (opens in a new tab)

How to fix?

Upgrade Rocky-Linux:8 postgresql-upgrade to version 0:12.17-1.module+el8.9.0+1603+444d1b54 or higher.
This issue was patched in RLSA-2023:7714.

NVD Description

Note: Versions mentioned in the description apply only to the upstream postgresql-upgrade package and not the postgresql-upgrade package as distributed by Rocky-Linux. See How to fix? for Rocky-Linux:8 relevant fixed versions and status.

A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.

CVSS Scores

version 3.1