-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat Integration Debezium 2.1.4 security update Advisory ID: RHSA-2023:1815-01 Product: Red Hat Integration Advisory URL: https://access.redhat.com/errata/RHSA-2023:1815 Issue date: 2023-04-17 CVE Names: CVE-2022-41946 ===================================================================== 1. Summary: A security update for Debezium is now available for Red Hat Integration. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Debezium is a distributed platform that turns your existing databases into event streams, so applications can see and respond immediately to each row-level change in the databases. Debezium is built on top of Apache Kafka and provides Kafka Connect compatible connectors that monitor specific database management systems. Debezium records the history of data changes in Kafka logs, from where your application consumes them. This makes it possible for your application to easily consume all of the events correctly and completely. Even if your application stops unexpectedly, it will not miss anything: when the application restarts, it will resume consuming the events where it left off. Security Fix(es): * jdbc-postgresql: postgresql-jdbc: PreparedStatement.setText(int, InputStream) will create a temporary file if the InputStream is larger than 2k (CVE-2022-41946) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2153399 - CVE-2022-41946 postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions 5. References: https://access.redhat.com/security/cve/CVE-2022-41946 https://access.redhat.com/security/updates/classification/#low 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZD10m9zjgjWX9erEAQh9dBAAhmVuToNCVu4H3LeIOBsGsl1jEcIfJCqt F0p6MpfVHhEpCtql9ArPqXqDD4wBlzybN6taF8UCMinqxSunYbGhLiErEwS8iQ/7 UZTPw4KntC5AKWYzgUfHiPzyvPNPU+oXRfCCGQZPE+WTAS7E3bdV94nshKYI5gSS fWK7Bp/zXqIaLadipUmweuyg/nm7aE2qbDjJORxnHxn83mbxnASSrOxfR3ihofTy XpoFvOWJnUUS4MdEfC4+fyxLRNKwaU4mEIdTJTmLOs8Y0uoWMUuGZyRq2soWG6yG DleEJbr+73as1XGWXIcQTFfSGe7sL4BXVILxczUwNn5ONCGvgueLZnOlA/hs3P4V UdkRfHZNFZ6vvB4bv2CTY9557icaa/MUiWYNujcuOBognotRaVMMySrQ34AMWS0o x2o5EVHkcaHG4RlsfH0VIPSscembWypQ6uDzVBUswPBeKKVd8z9r90dwqjL+HIxE zuu4zVRFbEMxdiLvXWqhYF1CKgiVGUVz+AqgVnGGzpN6GzLzAsuHM6tldTsBrutJ Bl1v9n0wEOpSe6T/4eNAPTQl1aXqkfbCZIGWqhnJ4FwYgJqx4xS1R4nhvd+hhYcQ tsYTQKFM7FznoSDKUBHsnmsV7P6IkO5SN6RjUh9JnuxYmMgDIliLTaIptkUDj3VT Gg4i7hw8Jjo= =Usvm -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce