Project Subscriptions
| Vendors | Products |
|---|---|
|
Postgresql
Subscribe
|
Postgresql
Subscribe
|
|
Redhat
Subscribe
|
Advanced Cluster Security
Subscribe
Codeready Linux Builder Eus
Subscribe
Codeready Linux Builder Eus For Power Little Endian Eus
Subscribe
Codeready Linux Builder For Arm64 Eus
Subscribe
Codeready Linux Builder For Ibm Z Systems Eus
Subscribe
Codeready Linux Builder For Power Little Endian Eus
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Arm 64
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Software Collections
Subscribe
Rhel Tus
Subscribe
Software Collections
Subscribe
|
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3651-1 | postgresql-11 security update |
Debian DSA |
DSA-5553-1 | postgresql-15 security update |
Debian DSA |
DSA-5554-1 | postgresql-13 security update |
EUVD |
EUVD-2023-58142 | A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory. |
Ubuntu USN |
USN-6538-1 | PostgreSQL vulnerabilities |
Ubuntu USN |
USN-6538-2 | PostgreSQL vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 25 Oct 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:9 |
Sat, 04 Oct 2025 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs |
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 14 Sep 2024 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-20T01:15:56.663Z
Reserved: 2023-10-31T03:56:17.314Z
Link: CVE-2023-5868
No data.
Status : Modified
Published: 2023-12-10T18:15:07.163
Modified: 2025-11-04T20:17:13.493
Link: CVE-2023-5868
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN