Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-5870

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-10 Dec, 2023 | 17:58
Updated At-02 Mar, 2026 | 17:25
Rejected At-
Credits

Postgresql: role pg_signal_backend can signal certain superuser processes.

A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:10 Dec, 2023 | 17:58
Updated At:02 Mar, 2026 | 17:25
Rejected At:
â–¼CVE Numbering Authority (CNA)
Postgresql: role pg_signal_backend can signal certain superuser processes.

A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.

Affected Products
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Advanced Cluster Security 4.2
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-central-db-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:4.2::el8
Default Status
affected
Versions
Unaffected
  • From 4.2.4-6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Advanced Cluster Security 4.2
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-main-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:4.2::el8
Default Status
affected
Versions
Unaffected
  • From 4.2.4-6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Advanced Cluster Security 4.2
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-operator-bundle
CPEs
  • cpe:/a:redhat:advanced_cluster_security:4.2::el8
Default Status
affected
Versions
Unaffected
  • From 4.2.4-7 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Advanced Cluster Security 4.2
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-scanner-db-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:4.2::el8
Default Status
affected
Versions
Unaffected
  • From 4.2.4-6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Advanced Cluster Security 4.2
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-scanner-db-slim-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:4.2::el8
Default Status
affected
Versions
Unaffected
  • From 4.2.4-7 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:13
CPEs
  • cpe:/a:redhat:enterprise_linux:8::appstream
Default Status
affected
Versions
Unaffected
  • From 8090020231114113712.a75119d5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:12
CPEs
  • cpe:/a:redhat:enterprise_linux:8::appstream
Default Status
affected
Versions
Unaffected
  • From 8090020231128173330.a75119d5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:15
CPEs
  • cpe:/a:redhat:enterprise_linux:8::appstream
Default Status
affected
Versions
Unaffected
  • From 8090020231114113548.a75119d5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.2 Advanced Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:12
CPEs
  • cpe:/a:redhat:rhel_aus:8.2::appstream
  • cpe:/a:redhat:rhel_tus:8.2::appstream
  • cpe:/a:redhat:rhel_e4s:8.2::appstream
Default Status
affected
Versions
Unaffected
  • From 8020020231128165246.4cda2c84 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.2 Telecommunications Update Service
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:12
CPEs
  • cpe:/a:redhat:rhel_aus:8.2::appstream
  • cpe:/a:redhat:rhel_tus:8.2::appstream
  • cpe:/a:redhat:rhel_e4s:8.2::appstream
Default Status
affected
Versions
Unaffected
  • From 8020020231128165246.4cda2c84 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:12
CPEs
  • cpe:/a:redhat:rhel_aus:8.2::appstream
  • cpe:/a:redhat:rhel_tus:8.2::appstream
  • cpe:/a:redhat:rhel_e4s:8.2::appstream
Default Status
affected
Versions
Unaffected
  • From 8020020231128165246.4cda2c84 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:12
CPEs
  • cpe:/a:redhat:rhel_e4s:8.4::appstream
  • cpe:/a:redhat:rhel_tus:8.4::appstream
  • cpe:/a:redhat:rhel_aus:8.4::appstream
Default Status
affected
Versions
Unaffected
  • From 8040020231127153301.522a0ee4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:13
CPEs
  • cpe:/a:redhat:rhel_e4s:8.4::appstream
  • cpe:/a:redhat:rhel_tus:8.4::appstream
  • cpe:/a:redhat:rhel_aus:8.4::appstream
Default Status
affected
Versions
Unaffected
  • From 8040020231127154806.522a0ee4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.4 Telecommunications Update Service
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:12
CPEs
  • cpe:/a:redhat:rhel_e4s:8.4::appstream
  • cpe:/a:redhat:rhel_tus:8.4::appstream
  • cpe:/a:redhat:rhel_aus:8.4::appstream
Default Status
affected
Versions
Unaffected
  • From 8040020231127153301.522a0ee4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.4 Telecommunications Update Service
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:13
CPEs
  • cpe:/a:redhat:rhel_e4s:8.4::appstream
  • cpe:/a:redhat:rhel_tus:8.4::appstream
  • cpe:/a:redhat:rhel_aus:8.4::appstream
Default Status
affected
Versions
Unaffected
  • From 8040020231127154806.522a0ee4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:12
CPEs
  • cpe:/a:redhat:rhel_e4s:8.4::appstream
  • cpe:/a:redhat:rhel_tus:8.4::appstream
  • cpe:/a:redhat:rhel_aus:8.4::appstream
Default Status
affected
Versions
Unaffected
  • From 8040020231127153301.522a0ee4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:13
CPEs
  • cpe:/a:redhat:rhel_e4s:8.4::appstream
  • cpe:/a:redhat:rhel_tus:8.4::appstream
  • cpe:/a:redhat:rhel_aus:8.4::appstream
Default Status
affected
Versions
Unaffected
  • From 8040020231127154806.522a0ee4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:13
CPEs
  • cpe:/a:redhat:rhel_eus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 8060020231114115246.ad008a3a before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:12
CPEs
  • cpe:/a:redhat:rhel_eus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 8060020231128165328.ad008a3a before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:13
CPEs
  • cpe:/a:redhat:rhel_eus:8.8::appstream
Default Status
affected
Versions
Unaffected
  • From 8080020231114105206.63b34585 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:12
CPEs
  • cpe:/a:redhat:rhel_eus:8.8::appstream
Default Status
affected
Versions
Unaffected
  • From 8080020231128165335.63b34585 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:15
CPEs
  • cpe:/a:redhat:rhel_eus:8.8::appstream
Default Status
affected
Versions
Unaffected
  • From 8080020231113134015.63b34585 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql
CPEs
  • cpe:/a:redhat:enterprise_linux:9::crb
  • cpe:/a:redhat:enterprise_linux:9::appstream
Default Status
affected
Versions
Unaffected
  • From 0:13.13-1.el9_3 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:15
CPEs
  • cpe:/a:redhat:enterprise_linux:9::appstream
Default Status
affected
Versions
Unaffected
  • From 9030020231120082734.rhel9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.0 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql
CPEs
  • cpe:/a:redhat:rhel_eus:9.0::appstream
  • cpe:/a:redhat:rhel_eus:9.0::crb
Default Status
affected
Versions
Unaffected
  • From 0:13.13-1.el9_0 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.2 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql
CPEs
  • cpe:/a:redhat:rhel_eus:9.2::crb
  • cpe:/a:redhat:rhel_eus:9.2::appstream
Default Status
affected
Versions
Unaffected
  • From 0:13.13-1.el9_2 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.2 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:15
CPEs
  • cpe:/a:redhat:rhel_eus:9.2::appstream
Default Status
affected
Versions
Unaffected
  • From 9020020231115020618.rhel9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Software Collections for Red Hat Enterprise Linux 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-postgresql12-postgresql
CPEs
  • cpe:/a:redhat:rhel_software_collections:3::el7
Default Status
affected
Versions
Unaffected
  • From 0:12.17-1.el7 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Software Collections for Red Hat Enterprise Linux 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-postgresql13-postgresql
CPEs
  • cpe:/a:redhat:rhel_software_collections:3::el7
Default Status
affected
Versions
Unaffected
  • From 0:13.13-1.el7 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHACS-3.74-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-central-db-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:3.74::el8
Default Status
affected
Versions
Unaffected
  • From 3.74.8-9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHACS-3.74-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-main-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:3.74::el8
Default Status
affected
Versions
Unaffected
  • From 3.74.8-9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHACS-3.74-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-operator-bundle
CPEs
  • cpe:/a:redhat:advanced_cluster_security:3.74::el8
Default Status
affected
Versions
Unaffected
  • From 3.74.8-7 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHACS-3.74-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-scanner-db-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:3.74::el8
Default Status
affected
Versions
Unaffected
  • From 3.74.8-9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHACS-3.74-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-scanner-db-slim-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:3.74::el8
Default Status
affected
Versions
Unaffected
  • From 3.74.8-9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHACS-4.1-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-central-db-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:4.1::el8
Default Status
affected
Versions
Unaffected
  • From 4.1.6-6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHACS-4.1-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-main-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:4.1::el8
Default Status
affected
Versions
Unaffected
  • From 4.1.6-6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHACS-4.1-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-operator-bundle
CPEs
  • cpe:/a:redhat:advanced_cluster_security:4.1::el8
Default Status
affected
Versions
Unaffected
  • From 4.1.6-6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHACS-4.1-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-scanner-db-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:4.1::el8
Default Status
affected
Versions
Unaffected
  • From 4.1.6-6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHACS-4.1-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
advanced-cluster-security/rhacs-scanner-db-slim-rhel8
CPEs
  • cpe:/a:redhat:advanced_cluster_security:4.1::el8
Default Status
affected
Versions
Unaffected
  • From 4.1.6-6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 6
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql
CPEs
  • cpe:/o:redhat:enterprise_linux:6
Default Status
unknown
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql
CPEs
  • cpe:/o:redhat:enterprise_linux:7
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:10/postgresql
CPEs
  • cpe:/o:redhat:enterprise_linux:8
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:16/postgresql
CPEs
  • cpe:/o:redhat:enterprise_linux:8
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
postgresql:16/postgresql
CPEs
  • cpe:/o:redhat:enterprise_linux:9
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Software Collections
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-postgresql10-postgresql
CPEs
  • cpe:/a:redhat:rhel_software_collections:3
Default Status
affected
Problem Types
TypeCWE IDDescription
CWECWE-400Uncontrolled Resource Consumption
Type: CWE
CWE ID: CWE-400
Description: Uncontrolled Resource Consumption
Metrics
VersionBase scoreBase severityVector
3.12.2LOW
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
Version: 3.1
Base score: 2.2
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
Metrics Other Info
Red Hat severity rating
value:
Low
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Exploits

Credits

Upstream acknowledges Hemanth Sandrana and Mahendrakar Srinivasarao as the original reporters.
Timeline
EventDate
Reported to Red Hat.2023-10-31 00:00:00
Made public.2023-11-09 00:00:00
Event: Reported to Red Hat.
Date: 2023-10-31 00:00:00
Event: Made public.
Date: 2023-11-09 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2023:7545
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7579
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7580
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7581
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7616
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7656
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7666
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7667
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7694
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7695
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7714
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7770
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7772
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7784
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7785
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7883
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7884
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2023:7885
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0304
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0332
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:0337
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2023-5870
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2247170
issue-tracking
x_refsource_REDHAT
https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
N/A
https://www.postgresql.org/support/security/CVE-2023-5870/
N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7545
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7579
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7580
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7581
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7616
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7656
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7666
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7667
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7694
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7695
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7714
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7770
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7772
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7784
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7785
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7883
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7884
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7885
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0304
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0332
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0337
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2023-5870
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2247170
Resource:
issue-tracking
x_refsource_REDHAT
Hyperlink: https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
Resource: N/A
Hyperlink: https://www.postgresql.org/support/security/CVE-2023-5870/
Resource: N/A
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2023:7545
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7579
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7580
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7581
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7616
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7656
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7666
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7667
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7694
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7695
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7714
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7770
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7772
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7784
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7785
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7883
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7884
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2023:7885
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:0304
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:0332
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:0337
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/security/cve/CVE-2023-5870
vdb-entry
x_refsource_REDHAT
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=2247170
issue-tracking
x_refsource_REDHAT
x_transferred
https://security.netapp.com/advisory/ntap-20240119-0003/
x_transferred
https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
x_transferred
https://www.postgresql.org/support/security/CVE-2023-5870/
x_transferred
https://lists.debian.org/debian-lts-announce/2023/11/msg00007.html
N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7545
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7579
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7580
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7581
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7616
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7656
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7666
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7667
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7694
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7695
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7714
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7770
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7772
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7784
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7785
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7883
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7884
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7885
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0304
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0332
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0337
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/security/cve/CVE-2023-5870
Resource:
vdb-entry
x_refsource_REDHAT
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2247170
Resource:
issue-tracking
x_refsource_REDHAT
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20240119-0003/
Resource:
x_transferred
Hyperlink: https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
Resource:
x_transferred
Hyperlink: https://www.postgresql.org/support/security/CVE-2023-5870/
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/11/msg00007.html
Resource: N/A
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:10 Dec, 2023 | 18:15
Updated At:04 Nov, 2025 | 20:17

A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.12.2LOW
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
Primary3.14.4MEDIUM
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 2.2
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
Type: Primary
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
CPE Matches

The PostgreSQL Global Development Group
postgresql
>>postgresql>>Versions from 11.0(inclusive) to 11.22(exclusive)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>Versions from 12.0(inclusive) to 12.17(exclusive)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>Versions from 13.0(inclusive) to 13.13(exclusive)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>Versions from 14.0(inclusive) to 14.10(exclusive)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>Versions from 15.0(inclusive) to 15.5(exclusive)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>16.0
cpe:2.3:a:postgresql:postgresql:16.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>codeready_linux_builder_eus>>9.2
cpe:2.3:a:redhat:codeready_linux_builder_eus:9.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>codeready_linux_builder_eus_for_power_little_endian_eus>>9.0_ppc64le
cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>codeready_linux_builder_eus_for_power_little_endian_eus>>9.2_ppc64le
cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>codeready_linux_builder_for_arm64_eus>>8.6_aarch64
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.6_aarch64:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>codeready_linux_builder_for_arm64_eus>>9.0_aarch64
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.0_aarch64:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>codeready_linux_builder_for_arm64_eus>>9.2_aarch64
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>codeready_linux_builder_for_ibm_z_systems_eus>>9.0_s390x
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.0_s390x:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>codeready_linux_builder_for_ibm_z_systems_eus>>9.2_s390x
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>codeready_linux_builder_for_power_little_endian_eus>>9.0_ppc64le
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>codeready_linux_builder_for_power_little_endian_eus>>9.2_ppc64le
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>software_collections>>1.0
cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>8.0
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>9.0
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_eus>>8.6
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_eus>>8.8
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_eus>>9.0
cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_eus>>9.2
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_arm_64>>8.0
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_arm_64>>8.8_aarch64
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.8_aarch64:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_ibm_z_systems>>8.0_s390x
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_ibm_z_systems_eus>>8.6_s390x
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_ibm_z_systems_eus>>8.8_s390x
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_ibm_z_systems_eus>>9.0_s390x
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.0_s390x:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_ibm_z_systems_eus>>9.2_s390x
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_power_little_endian>>8.0_ppc64le
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_power_little_endian_eus>>8.6_ppc64le
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_power_little_endian_eus>>8.8_ppc64le
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_power_little_endian_eus>>9.0_ppc64le
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_for_power_little_endian_eus>>9.2_ppc64le
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_aus>>8.2
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_aus>>8.4
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_aus>>8.6
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_aus>>9.2
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_tus>>8.2
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_tus>>8.4
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_tus>>8.6
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-400Secondarysecalert@redhat.com
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: CWE-400
Type: Secondary
Source: secalert@redhat.com
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2023:7545secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7579secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7580secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7581secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7616secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7656secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7666secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7667secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7694secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7695secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7714secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7770secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7772secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7784secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2023:7785secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2023:7883secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2023:7884secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2023:7885secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:0304secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:0332secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:0337secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2023-5870secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2247170secalert@redhat.com
Issue Tracking
https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/secalert@redhat.com
Release Notes
https://www.postgresql.org/support/security/CVE-2023-5870/secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7545af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7579af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7580af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7581af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7616af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7656af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7666af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7667af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7694af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7695af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7714af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7770af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7772af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7784af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2023:7785af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2023:7883af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2023:7884af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2023:7885af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2024:0304af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2024:0332af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2024:0337af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/security/cve/CVE-2023-5870af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2247170af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://lists.debian.org/debian-lts-announce/2023/11/msg00007.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://security.netapp.com/advisory/ntap-20240119-0003/af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.postgresql.org/support/security/CVE-2023-5870/af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7545
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7579
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7580
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7581
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7616
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7656
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7666
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7667
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7694
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7695
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7714
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7770
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7772
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7784
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7785
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7883
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7884
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7885
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0304
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0332
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0337
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2023-5870
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2247170
Source: secalert@redhat.com
Resource:
Issue Tracking
Hyperlink: https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
Source: secalert@redhat.com
Resource:
Release Notes
Hyperlink: https://www.postgresql.org/support/security/CVE-2023-5870/
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7545
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7579
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7580
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7581
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7616
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7656
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7666
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7667
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7694
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7695
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7714
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7770
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7772
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7784
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7785
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7883
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7884
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2023:7885
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0304
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0332
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:0337
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2023-5870
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2247170
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/11/msg00007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20240119-0003/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://www.postgresql.org/support/security/CVE-2023-5870/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

163Records found

CVE-2022-2053
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.30% / 53.79%
||
7 Day CHG~0.00%
Published-05 Aug, 2022 | 15:24
Updated-03 Aug, 2024 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy marking the backend worker (application server) as an error state and not forward requests to the worker for a while. In mod_cluster, this continues until the next STATUS request (10 seconds intervals) from the application server updates the server state. So, in the worst case, it can result in "All workers are in error state" and mod_cluster responds "503 Service Unavailable" for a while (up to 10 seconds). In mod_proxy_balancer, it does not forward requests to the worker until the "retry" timeout passes. However, luckily, mod_proxy_balancer has "forcerecovery" setting (On by default; this parameter can force the immediate recovery of all workers without considering the retry parameter of the workers if all workers of a balancer are in error state.). So, unlike mod_cluster, mod_proxy_balancer does not result in responding "503 Service Unavailable". An attacker could use this behavior to send a malicious request and trigger server errors, resulting in DoS (denial of service). This flaw was fixed in Undertow 2.2.19.Final, Undertow 2.3.0.Alpha2.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_fuseintegration_camel_kundertowUndertow
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-1677
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.23% / 45.55%
||
7 Day CHG~0.00%
Published-01 Sep, 2022 | 19:51
Updated-03 Aug, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-openshift_container_platformOpenshift
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-1708
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.45% / 63.82%
||
7 Day CHG-0.14%
Published-07 Jun, 2022 | 17:43
Updated-03 Aug, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.

Action-Not Available
Vendor-n/aFedora ProjectRed Hat, Inc.Kubernetes
Product-cri-oopenshift_container_platformfedoraenterprise_linuxCRI-O
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2022-0669
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.15% / 36.26%
||
7 Day CHG-0.05%
Published-29 Aug, 2022 | 14:03
Updated-02 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service.

Action-Not Available
Vendor-openvswitchdpdkn/aRed Hat, Inc.
Product-openvswitchopenshift_container_platformdata_plane_development_kitDPDK
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-0671
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.38% / 59.71%
||
7 Day CHG~0.00%
Published-18 Feb, 2022 | 17:50
Updated-02 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in vscode-xml in versions prior to 0.19.0. Schema download could lead to blind SSRF or DoS via a large file.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-vscode-xmlvscode-xml
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-3056
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.7||HIGH
EPSS-0.36% / 57.96%
||
7 Day CHG~0.00%
Published-02 Aug, 2024 | 20:37
Updated-14 Nov, 2025 | 01:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Podman: kernel: containers in shared ipc namespace are vulnerable to denial of service attack

A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious container will continue to exhaust resources until it is out-of-memory (OOM) killed. While the malicious container's cgroup will be removed, the IPC resources it created are not. Those resources are tied to the IPC namespace that will not be removed until all containers using it are stopped, and one non-malicious container is holding the namespace open. The malicious container is restarted, either automatically or by attacker control, repeating the process and increasing the amount of memory consumed. With a container configured to restart always, such as `podman run --restart=always`, this can result in a memory-based denial of service of the system.

Action-Not Available
Vendor-podman_projectRed Hat, Inc.Fedora Project
Product-podmanopenshift_container_platformenterprise_linuxfedoraRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8Red Hat OpenShift Container Platform 3.11Red Hat OpenShift Container Platform 4Red Hat Enterprise Linux 10Red Hat Enterprise Linux 7
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2014-7813
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.43% / 62.68%
||
7 Day CHG~0.00%
Published-18 Oct, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Red Hat CloudForms 3 Management Engine (CFME) allows remote authenticated users to cause a denial of service (resource consumption) via vectors involving calls to the .to_sym rails function and lack of garbage collection of inserted symbols.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-cloudforms_3.0_management_enginen/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-4040
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-4.23% / 88.79%
||
7 Day CHG~0.00%
Published-24 Aug, 2022 | 15:13
Updated-03 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in AMQ Broker. This issue can cause a partial interruption to the availability of AMQ Broker via an Out of memory (OOM) condition. This flaw allows an attacker to partially disrupt availability to the broker through a sustained attack of maliciously crafted messages. The highest threat from this vulnerability is system availability.

Action-Not Available
Vendor-n/aRed Hat, Inc.The Apache Software Foundation
Product-activemq_artemisamq_brokerAMQ Broker
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-17189
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-5.3||MEDIUM
EPSS-5.62% / 90.35%
||
7 Day CHG~0.00%
Published-30 Jan, 2019 | 22:00
Updated-17 Sep, 2024 | 01:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.

Action-Not Available
Vendor-Canonical Ltd.The Apache Software FoundationRed Hat, Inc.NetApp, Inc.Fedora ProjectDebian GNU/LinuxOracle Corporation
Product-http_serversun_zfs_storage_appliance_kitubuntu_linuxdebian_linuxinstantis_enterprisetrackfedoraretail_xstore_point_of_serviceenterprise_linuxstorage_automation_storehospitality_guest_accesssantricity_cloud_connectorenterprise_manager_ops_centerjboss_core_servicesApache HTTP Server
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2014-3690
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 10.10%
||
7 Day CHG-0.01%
Published-10 Nov, 2014 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncopenSUSESUSERed Hat, Inc.Debian GNU/LinuxNovellCanonical Ltd.
Product-enterprise_linuxlinux_kernelevergreenubuntu_linuxlinux_enterprise_real_time_extensionsuse_linux_enterprise_serversuse_linux_enterprise_desktoplinux_enterprise_workstation_extensiondebian_linuxlinux_enterprise_software_development_kitn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2018-17581
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.25% / 48.59%
||
7 Day CHG~0.00%
Published-28 Sep, 2018 | 00:00
Updated-05 Aug, 2024 | 10:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a recursive function, leading to Denial of service.

Action-Not Available
Vendor-n/aCanonical Ltd.Exiv2Red Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxexiv2debian_linuxenterprise_linux_workstationenterprise_linux_desktopn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2014-3687
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-3.68% / 87.94%
||
7 Day CHG-0.04%
Published-10 Nov, 2014 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.

Action-Not Available
Vendor-n/aopenSUSELinux Kernel Organization, IncSUSERed Hat, Inc.NovellDebian GNU/LinuxOracle CorporationCanonical Ltd.
Product-linux_kernelubuntu_linuxenterprise_mrgevergreensuse_linux_enterprise_serverlinux_enterprise_real_time_extensionsuse_linux_enterprise_desktoplinux_enterprise_workstation_extensiondebian_linuxlinuxlinux_enterprise_software_development_kitn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2014-3672
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 18.80%
||
7 Day CHG+0.03%
Published-25 May, 2016 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.

Action-Not Available
Vendor-n/aRed Hat, Inc.Xen Project
Product-libvirtxenn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2014-3648
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.33% / 55.60%
||
7 Day CHG~0.00%
Published-01 Jul, 2022 | 13:16
Updated-06 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The simplepush server iterates through the application installations and pushes a notification to the server provided by deviceToken. But this is user controlled. If a bogus applications is registered with bad deviceTokens, one can generate endless exceptions when those endpoints can't be reached or can slow the server down by purposefully wasting it's time with slow endpoints. Similarly, one can provide whatever HTTP end point they want. This turns the server into a DDOS vector or an anonymizer for the posting of malware and so on.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_aerogearJboss Aerogear
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-3737
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 30.83%
||
7 Day CHG~0.00%
Published-04 Mar, 2022 | 00:00
Updated-17 Dec, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

Action-Not Available
Vendor-n/aFedora ProjectPython Software FoundationOracle CorporationRed Hat, Inc.NetApp, Inc.Canonical Ltd.
Product-ontap_select_deploy_administration_utilityenterprise_linuxcodeready_linux_builder_for_ibm_z_systemscommunications_cloud_native_core_binding_support_functionfedoraenterprise_linux_for_power_little_endianpythonubuntu_linuxcommunications_cloud_native_core_policyhcicodeready_linux_buildermanagement_services_for_element_softwarecommunications_cloud_native_core_network_exposure_functionnetapp_xcp_smbenterprise_linux_for_ibm_z_systemsxcp_nfscodeready_linux_builder_for_power_little_endianpython
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2021-3622
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.58% / 69.03%
||
7 Day CHG~0.00%
Published-23 Dec, 2021 | 20:31
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow. The highest threat from this vulnerability is to system availability.

Action-Not Available
Vendor-n/aRed Hat, Inc.Fedora Project
Product-hivexenterprise_linux_workstationenterprise_linuxfedorahivex
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-3690
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.28% / 51.25%
||
7 Day CHG~0.00%
Published-23 Aug, 2022 | 15:50
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-single_sign-onintegration_camel_kopenshift_application_runtimesenterprise_linuxundertowjboss_enterprise_application_platformintegration_camel_quarkusfuseundertow
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2021-3629
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.29% / 52.72%
||
7 Day CHG~0.00%
Published-24 May, 2022 | 18:19
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final.

Action-Not Available
Vendor-n/aRed Hat, Inc.NetApp, Inc.
Product-single_sign-onwildfly_coreintegrationenterprise_linuxactive_iq_unified_managerundertowoncommand_workflow_automationjboss_enterprise_application_platformoncommand_insightundertow
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-3679
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-1.41% / 80.49%
||
7 Day CHG~0.00%
Published-05 Aug, 2021 | 19:54
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxRed Hat, Inc.
Product-debian_linuxlinux_kernelenterprise_linuxkernel
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2021-3669
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.74%
||
7 Day CHG~0.00%
Published-26 Aug, 2022 | 15:25
Updated-03 Nov, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.

Action-Not Available
Vendor-n/aFedora ProjectIBM CorporationLinux Kernel Organization, IncDebian GNU/LinuxRed Hat, Inc.
Product-enterprise_linux_for_ibm_z_systemsenterprise_linuxenterprise_linux_eusspectrum_protect_plusenterprise_linux_for_power_little_endianenterprise_linux_for_real_time_for_nfventerprise_linux_for_real_time_for_nfv_tusopenshift_container_platformcodeready_linux_builderenterprise_linux_for_real_time_tusvirtualization_hostdebian_linuxenterprise_linux_server_ausenterprise_linux_for_power_little_endian_eusspectrum_copy_data_managemententerprise_linux_for_ibm_z_systems_euslinux_kernelenterprise_linux_server_tusbuild_of_quarkusfedoradeveloper_toolsenterprise_linux_ausenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsenterprise_linux_for_real_timekernel
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-0992
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-2.9||LOW
EPSS-0.02% / 5.39%
||
7 Day CHG~0.00%
Published-15 Jan, 2026 | 14:20
Updated-15 Apr, 2026 | 18:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Libxml2: libxml2: denial of service via crafted xml catalogs

A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Container Platform 4Red Hat Enterprise Linux 9Red Hat JBoss Core ServicesRed Hat Hardened ImagesRed Hat Enterprise Linux 8Red Hat Enterprise Linux 10Red Hat Enterprise Linux 7Red Hat Enterprise Linux 6
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2010-4251
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-2.15% / 84.27%
||
7 Day CHG~0.00%
Published-26 May, 2011 | 16:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.

Action-Not Available
Vendor-n/aRed Hat, Inc.VMware (Broadcom Inc.)Linux Kernel Organization, Inc
Product-linux_kernelenterprise_linuxesxn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-35510
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.56% / 68.47%
||
7 Day CHG~0.00%
Published-02 Jun, 2021 | 13:22
Updated-04 Aug, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-remoting code, deleting the lines that send the ACK message from the EJB client code resulting in a denial of service. The highest threat from this vulnerability is to system availability.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss-remotingjboss-remoting
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2019-3874
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 39.45%
||
7 Day CHG~0.00%
Published-25 Mar, 2019 | 18:30
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.

Action-Not Available
Vendor-Linux Kernel Organization, IncDebian GNU/LinuxNetApp, Inc.The Linux FoundationRed Hat, Inc.Canonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kernelcn1610hci_management_nodeenterprise_linuxcn1610_firmwareactive_iq_unified_manager_for_vmware_vspheresnapprotectsolidfirekernel
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-36332
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.82% / 74.39%
||
7 Day CHG~0.00%
Published-21 May, 2021 | 16:21
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability.

Action-Not Available
Vendor-webmprojectn/aRed Hat, Inc.NetApp, Inc.Debian GNU/Linux
Product-ontap_select_deploy_administration_utilitylibwebpdebian_linuxenterprise_linuxlibwebp
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2019-5419
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-12.12% / 93.83%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 13:43
Updated-04 Aug, 2024 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.

Action-Not Available
Vendor-Fedora ProjectDebian GNU/LinuxRuby on RailsopenSUSERed Hat, Inc.
Product-debian_linuxsoftware_collectionsfedoracloudformsrailsleaphttps://github.com/rails/rails
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-5024
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-0.51% / 66.30%
||
7 Day CHG~0.00%
Published-22 May, 2025 | 14:51
Updated-20 Nov, 2025 | 21:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gnome-remote-desktop: uncontrolled resource consumption due to malformed rdp pdus

A flaw was found in gnome-remote-desktop. Once gnome-remote-desktop listens for RDP connections, an unauthenticated attacker can exhaust system resources and repeatedly crash the process. There may be a resource leak after many attacks, which will also result in gnome-remote-desktop no longer being able to open files even after it is restarted via systemd.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRed Hat Enterprise Linux 10Red Hat Enterprise Linux 9Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRed Hat Enterprise Linux 9.4 Extended Update SupportRed Hat Enterprise Linux 8.2 Advanced Update SupportRed Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.8 Telecommunications Update ServiceRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRed Hat Enterprise Linux 8
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-27782
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.18% / 39.90%
||
7 Day CHG~0.00%
Published-23 Feb, 2021 | 18:35
Updated-04 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_fuseopenshift_application_runtimesundertowUndertow
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-27827
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.41% / 61.72%
||
7 Day CHG~0.00%
Published-18 Mar, 2021 | 00:00
Updated-03 Dec, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

Action-Not Available
Vendor-openvswitchlldpd_projectn/aFedora ProjectRed Hat, Inc.Siemens AG
Product-simatic_net_cp_1243-8_irc_firmwaresimatic_net_cp_1543sp-1_firmwaresimatic_net_cp_1545-1_firmwaretim_1531_ircsinumerik_one_firmwareopenshift_container_platformsimatic_net_cp_1542sp-1_ircsimatic_net_cp_1543sp-1simatic_net_cp_1243-1tim_1531_irc_firmwaresimatic_net_cp_1542sp-1simatic_hmi_unified_comfort_panelssinumerik_onesimatic_net_cp_1543-1_firmwarevirtualizationsimatic_net_cp_1243-8_ircsimatic_net_cp_1243-1_firmwareenterprise_linuxfedorasimatic_net_cp_1543-1openvswitchsimatic_net_cp_1545-1simatic_net_cp_1542sp-1_irc_firmwareopenstacksimatic_hmi_unified_comfort_panels_firmwarelldpdsimatic_net_cp_1542sp-1_firmwarelldp/openvswitch
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-4438
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.06% / 19.87%
||
7 Day CHG-0.02%
Published-08 May, 2024 | 08:59
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Etcd: incomplete fix for cve-2023-39325/cve-2023-44487 in openstack platform

The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2023-39325/CVE-2023-44487, known as Rapid Reset. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenStack Platform 16.1Red Hat OpenStack Platform 18.0Red Hat OpenStack Platform 16.2Red Hat OpenStack Platform 17.1 for RHEL 9
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-4437
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.42%
||
7 Day CHG-0.02%
Published-08 May, 2024 | 08:57
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Etcd: incomplete fix for cve-2021-44716 in openstack platform

The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2021-44716. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenStack Platform 17.1Red Hat OpenStack Platform 16.1Red Hat OpenStack Platform 18.0Red Hat OpenStack Platform 16.2
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-4436
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.10% / 27.97%
||
7 Day CHG~0.00%
Published-08 May, 2024 | 08:57
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Etcd: incomplete fix for cve-2022-41723 in openstack platform

The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2022-41723. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenStack Platform 16.1Red Hat OpenStack Platform 16.2Red Hat OpenStack Platform 17.1Red Hat OpenStack Platform 18.0
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2012-0876
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.31% / 53.90%
||
7 Day CHG~0.00%
Published-03 Jul, 2012 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.

Action-Not Available
Vendor-libexpat_projectn/aCanonical Ltd.Red Hat, Inc.Oracle CorporationPython Software FoundationDebian GNU/Linux
Product-storageenterprise_linux_desktopenterprise_linux_server_ausubuntu_linuxenterprise_linux_eusenterprise_linux_workstationlibexpatpythondebian_linuxsolarisenterprise_linux_servern/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2012-0877
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.54% / 67.78%
||
7 Day CHG~0.00%
Published-22 Nov, 2019 | 16:15
Updated-06 Aug, 2024 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PyXML: Hash table collisions CPU usage Denial of Service

Action-Not Available
Vendor-PyXMLRed Hat, Inc.Python Software Foundation
Product-enterprise_linuxenterprise_virtualization_hypervisorpyxmlPyXML
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2012-0260
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-6.5||MEDIUM
EPSS-1.94% / 83.45%
||
7 Day CHG~0.00%
Published-05 Jun, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The JPEGWarningHandler function in coders/jpeg.c in ImageMagick before 6.7.6-3 allows remote attackers to cause a denial of service (memory consumption) via a JPEG image with a crafted sequence of restart markers.

Action-Not Available
Vendor-n/aCanonical Ltd.Red Hat, Inc.openSUSEImageMagick Studio LLCDebian GNU/Linux
Product-storageenterprise_linux_desktopubuntu_linuximagemagickenterprise_linux_eusenterprise_linux_workstationenterprise_linux_ausdebian_linuxopensuseenterprise_linux_server_eusenterprise_linux_servern/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2011-3348
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-34.03% / 96.98%
||
7 Day CHG~0.00%
Published-19 Sep, 2011 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request.

Action-Not Available
Vendor-n/aThe Apache Software FoundationRed Hat, Inc.
Product-http_serverenterprise_linuxjboss_enterprise_web_servern/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2011-2491
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.07% / 20.77%
||
7 Day CHG~0.00%
Published-01 Mar, 2013 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call.

Action-Not Available
Vendor-n/aRed Hat, Inc.Linux Kernel Organization, Inc
Product-linux_kernelenterprise_linux_serverenterprise_linux_desktopenterprise_linux_workstationn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2011-2189
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-7.62% / 91.89%
||
7 Day CHG~0.00%
Published-10 Oct, 2011 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.Red Hat, Inc.
Product-linux_kernelenterprise_linuxdebian_linuxubuntu_linuxenterprise_mrgn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-1635
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-22.69% / 95.88%
||
7 Day CHG~0.00%
Published-19 Feb, 2024 | 21:23
Updated-17 Mar, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Undertow: out-of-memory error after several closed connections with wildfly-http-client protocol

A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.

Action-Not Available
Vendor-NetApp, Inc.Red Hat, Inc.
Product-openshift_container_platform_for_powerintegration_camel_for_spring_bootsingle_sign-ononcommand_workflow_automationactive_iq_unified_manageropenshift_container_platformfuseopenshift_container_platform_for_linuxonejboss_enterprise_application_platformRed Hat build of Apache Camel for Spring Boot 3Red Hat Integration Camel K 1Red Hat build of QuarkusRHEL-8 based Middleware ContainersOpenShift ServerlessRed Hat Fuse 7.13.0Red Hat build of Apache Camel 4 for Quarkus 3Red Hat build of OptaPlanner 8Red Hat Build of KeycloakRed Hat Process Automation 7Red Hat build of Apache Camel for Spring Boot 4Red Hat JBoss Enterprise Application PlatformRed Hat Data Grid 8Red Hat Integration Camel Quarkus 2Red Hat build of Apache Camel 4.4.1 for Spring Boot 3.2Red Hat Single Sign-On 7.6 for RHEL 8Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat build of Apicurio Registry 2Red Hat JBoss Data Grid 7Red Hat Single Sign-On 7.6 for RHEL 7Red Hat JBoss Fuse Service Works 6Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7streams for Apache KafkaRed Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat Single Sign-On 7.6 for RHEL 9Red Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7RHSSO 7.6.8
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2011-1083
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.15% / 35.17%
||
7 Day CHG~0.00%
Published-03 Apr, 2011 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.

Action-Not Available
Vendor-n/aRed Hat, Inc.Linux Kernel Organization, IncSUSE
Product-linux_kernellinux_enterprise_serverenterprise_linux_workstationenterprise_linux_serverenterprise_linux_desktoplinux_enterprise_desktopn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-12698
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.29% / 52.58%
||
7 Day CHG+0.07%
Published-18 Dec, 2024 | 05:07
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ose-olm-catalogd-container: incomplete fix for rapid reset (cve-2023-39325/cve-2023-44487)

An incomplete fix for ose-olm-catalogd-container was issued for the Rapid Reset Vulnerability (CVE-2023-39325/CVE-2023-44487) where only unauthenticated streams were protected, not streams created by authenticated sources.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Container Platform 4.18
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-1750
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 49.23%
||
7 Day CHG~0.00%
Published-07 Jun, 2021 | 20:18
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the machine-config-operator that causes an OpenShift node to become unresponsive when a container consumes a large amount of memory. An attacker could use this flaw to deny access to schedule new pods in the OpenShift cluster. This was fixed in openshift/machine-config-operator 4.4.3, openshift/machine-config-operator 4.3.25, openshift/machine-config-operator 4.2.36.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-machine-config-operatormachine-config-operator-container
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-1700
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.33% / 55.66%
||
7 Day CHG~0.00%
Published-07 Feb, 2020 | 00:00
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

Action-Not Available
Vendor-ceph[UNKNOWN]Canonical Ltd.Red Hat, Inc.openSUSE
Product-openshift_container_storageubuntu_linuxcephleapceph
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-1702
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-3.3||LOW
EPSS-0.17% / 38.16%
||
7 Day CHG~0.00%
Published-27 May, 2021 | 19:45
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.

Action-Not Available
Vendor-containers-image_projectn/aRed Hat, Inc.
Product-containers-imageenterprise_linuxcontainers/image
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2023-6681
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 8.20%
||
7 Day CHG~0.00%
Published-12 Feb, 2024 | 14:04
Updated-26 Feb, 2026 | 20:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Jwcrypto: denail of service via specifically crafted jwe

A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack.

Action-Not Available
Vendor-latchsetRed Hat, Inc.Fedora Project
Product-fedoraenterprise_linuxenterprise_linux_for_ibm_z_systemsjwcryptoenterprise_linux_for_power_little_endianenterprise_linux_for_arm_64Red Hat Ansible Automation Platform 2Red Hat Enterprise Linux 8Red Hat Enterprise Linux 7Red Hat Enterprise Linux 9
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2023-6277
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-3.75% / 88.04%
||
7 Day CHG~0.00%
Published-24 Nov, 2023 | 18:20
Updated-22 Jan, 2026 | 15:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Libtiff: out-of-memory in tiffopen via a craft file

An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.

Action-Not Available
Vendor-LibTIFFFedora ProjectRed Hat, Inc.
Product-libtiffenterprise_linuxfedoraRed Hat Enterprise Linux 6Red Hat Enterprise Linux 8Red Hat Enterprise Linux 7Red Hat Enterprise Linux 9
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2023-6596
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.96%
||
7 Day CHG-0.02%
Published-25 Apr, 2024 | 16:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Openshift: incomplete fix for rapid reset (cve-2023-44487/cve-2023-39325)

An incomplete fix was shipped for the Rapid Reset (CVE-2023-44487/CVE-2023-39325) vulnerability for an OpenShift Containers.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Container Platform 4.12Red Hat OpenShift Container Platform 4.11Red Hat OpenShift Container Platform 4
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2023-5625
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 28.04%
||
7 Day CHG~0.00%
Published-01 Nov, 2023 | 13:28
Updated-20 Nov, 2025 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Python-eventlet: patch regression for cve-2021-21419 in some red hat builds

A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.

Action-Not Available
Vendor-Red Hat, Inc.
Product-openshift_container_platform_ibm_z_systemsenterprise_linuxopenshift_container_platform_for_arm64openshift_container_platform_for_poweropenstack_platformopenshift_container_platform_for_linuxoneIronic content for Red Hat OpenShift Container Platform 4.12Red Hat OpenStack Platform 17.1 for RHEL 8Red Hat OpenStack Platform 17.1 for RHEL 9
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2023-5685
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.47% / 64.81%
||
7 Day CHG~0.00%
Published-22 Mar, 2024 | 18:24
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Xnio: stackoverflowexception when the chain of notifier states becomes problematically big

A flaw was found in XNIO. The XNIO NotifierState that can cause a Stack Overflow Exception when the chain of notifier states becomes problematically large can lead to uncontrolled resource management and a possible denial of service (DoS).

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Data Grid 8Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7Red Hat JBoss Fuse Service Works 6Red Hat Integration Camel K 1Red Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat build of Apache Camel - HawtIO 4Red Hat build of Apache Camel 4.4.0 for Spring BootRed Hat JBoss Enterprise Application Platform 7Red Hat Process Automation 7Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat Build of KeycloakRed Hat JBoss Data Grid 7Red Hat JBoss Enterprise Application Platform 8Red Hat build of Apache Camel for Spring Boot 3
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-1722
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.37% / 58.77%
||
7 Day CHG~0.00%
Published-27 Apr, 2020 | 20:46
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in all ipa versions 4.x.x through 4.8.0. When sending a very long password (>= 1,000,000 characters) to the server, the password hashing process could exhaust memory and CPU leading to a denial of service and the website becoming unresponsive. The highest threat from this vulnerability is to system availability.

Action-Not Available
Vendor-freeipaRed Hat, Inc.
Product-freeipaenterprise_linuxipa
CWE ID-CWE-400
Uncontrolled Resource Consumption
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found