[RHSA-2023:1815-01] Low: Red Hat Integration Debezium 2.1.4 security update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Mon Apr 17 16:32:28 UTC 2023


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: Red Hat Integration Debezium 2.1.4 security update
Advisory ID:       RHSA-2023:1815-01
Product:           Red Hat Integration
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:1815
Issue date:        2023-04-17
CVE Names:         CVE-2022-41946 
=====================================================================

1. Summary:

A security update for Debezium is now available for Red Hat Integration.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Debezium is a distributed platform that turns your existing databases into
event streams, so applications can see and respond immediately to each
row-level change in the databases.

Debezium is built on top of Apache Kafka and provides Kafka Connect
compatible connectors that monitor specific database management systems.
Debezium records the history of data changes in Kafka logs, from where your
application consumes them. This makes it possible for your application to
easily consume all of the events correctly and completely. Even if your
application stops unexpectedly, it will not miss anything: when the
application restarts, it will resume consuming the events where it left
off.

Security Fix(es):

* jdbc-postgresql: postgresql-jdbc: PreparedStatement.setText(int,
InputStream) will create a temporary file if the InputStream is larger than
2k (CVE-2022-41946)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2153399 - CVE-2022-41946 postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions

5. References:

https://access.redhat.com/security/cve/CVE-2022-41946
https://access.redhat.com/security/updates/classification/#low

6. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBZD10m9zjgjWX9erEAQh9dBAAhmVuToNCVu4H3LeIOBsGsl1jEcIfJCqt
F0p6MpfVHhEpCtql9ArPqXqDD4wBlzybN6taF8UCMinqxSunYbGhLiErEwS8iQ/7
UZTPw4KntC5AKWYzgUfHiPzyvPNPU+oXRfCCGQZPE+WTAS7E3bdV94nshKYI5gSS
fWK7Bp/zXqIaLadipUmweuyg/nm7aE2qbDjJORxnHxn83mbxnASSrOxfR3ihofTy
XpoFvOWJnUUS4MdEfC4+fyxLRNKwaU4mEIdTJTmLOs8Y0uoWMUuGZyRq2soWG6yG
DleEJbr+73as1XGWXIcQTFfSGe7sL4BXVILxczUwNn5ONCGvgueLZnOlA/hs3P4V
UdkRfHZNFZ6vvB4bv2CTY9557icaa/MUiWYNujcuOBognotRaVMMySrQ34AMWS0o
x2o5EVHkcaHG4RlsfH0VIPSscembWypQ6uDzVBUswPBeKKVd8z9r90dwqjL+HIxE
zuu4zVRFbEMxdiLvXWqhYF1CKgiVGUVz+AqgVnGGzpN6GzLzAsuHM6tldTsBrutJ
Bl1v9n0wEOpSe6T/4eNAPTQl1aXqkfbCZIGWqhnJ4FwYgJqx4xS1R4nhvd+hhYcQ
tsYTQKFM7FznoSDKUBHsnmsV7P6IkO5SN6RjUh9JnuxYmMgDIliLTaIptkUDj3VT
Gg4i7hw8Jjo=
=Usvm
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list