Debian Security Advisory
DLA-3218-1 libpgjava -- LTS security update
- Date Reported:
- 03 Dec 2022
- Affected Packages:
- libpgjava
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2022-41946.
- More information:
-
pgjdbc is an open source postgresql JDBC Driver. In affected versions a prepared statement using either `PreparedStatement.setText(int, InputStream)` or `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 2k. This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system.
For Debian 10 buster, this problem has been fixed in version 42.2.5-2+deb10u3.
We recommend that you upgrade your libpgjava packages.
For the detailed security status of libpgjava please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libpgjava
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS