Debian alert DLA-2512-1 (libhibernate3-java)
| From: | Markus Koschany <apo@debian.org> | |
| To: | debian-lts-announce <debian-lts-announce@lists.debian.org> | |
| Subject: | [SECURITY] [DLA 2512-1] libhibernate3-java security update | |
| Date: | Sun, 03 Jan 2021 23:30:17 +0100 | |
| Message-ID: | <bae85ee2ad3df973d3040e734be16537bb792400.camel@debian.org> | 
------------------------------------------------------------------------- Debian LTS Advisory DLA-2512-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany January 03, 2021 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : libhibernate3-java Version : 3.6.10.Final-6+deb9u1 CVE ID : CVE-2020-25638 A flaw was found in hibernate-core. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. For Debian 9 stretch, this problem has been fixed in version 3.6.10.Final-6+deb9u1. We recommend that you upgrade your libhibernate3-java packages. For the detailed security status of libhibernate3-java please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libhibernate3-java Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
 
           