{"id":"BIT-postgresql-2023-5870","summary":"Postgresql: role pg_signal_backend can signal certain superuser processes.","details":"A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.","aliases":["CVE-2023-5870"],"modified":"2025-11-06T13:25:46.476Z","published":"2024-03-06T11:02:29.084Z","database_specific":{"severity":"Medium","cpes":["cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","cpe:2.3:a:postgresql:postgresql:16.0:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7545"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7579"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7580"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7581"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7616"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7656"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7666"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7667"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7694"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7695"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7714"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7770"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7772"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7784"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7785"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7883"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7884"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2023:7885"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:0304"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:0332"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:0337"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2023-5870"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247170"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20240119-0003/"},{"type":"WEB","url":"https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/"},{"type":"WEB","url":"https://www.postgresql.org/support/security/CVE-2023-5870/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5870"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00007.html"}],"affected":[{"package":{"name":"postgresql","ecosystem":"Bitnami","purl":"pkg:bitnami/postgresql"},"ranges":[{"type":"SEMVER","events":[{"introduced":"11.0.0"},{"fixed":"11.22.0"},{"introduced":"12.0.0"},{"fixed":"12.17.0"},{"introduced":"13.0.0"},{"fixed":"13.13.0"},{"introduced":"14.0.0"},{"fixed":"14.10.0"},{"introduced":"15.0.0"},{"fixed":"15.5.0"},{"introduced":"16.0.0"},{"fixed":"16.0.1"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/postgresql/BIT-postgresql-2023-5870.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}],"schema_version":"1.7.3"}