USN-4004-2: Berkeley DB vulnerability
4 June 2019
Berkeley DB could be made to expose sensitive information.
Releases
Packages
- db5.3 - Berkeley DB Utilities
Details
USN-4004-1 fixed a vulnerability in Berkeley DB. This update provides
the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that Berkeley DB incorrectly handled certain inputs.
An attacker could possibly use this issue to read sensitive information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
db5.3-util
-
5.3.28-3ubuntu3.1+esm1
-
libdb5.3-sql
-
5.3.28-3ubuntu3.1+esm1
-
db5.3-sql-util
-
5.3.28-3ubuntu3.1+esm1
-
libdb5.3-sql-dev
-
5.3.28-3ubuntu3.1+esm1
-
libdb5.3
-
5.3.28-3ubuntu3.1+esm1
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4019-1: libsqlite3-tcl, sqlite3-doc, libsqlite3-0, lemon, sqlite3, libsqlite3-dev
- USN-4019-2: libsqlite3-tcl, sqlite3-doc, libsqlite3-0, lemon, sqlite3, libsqlite3-dev
- USN-4004-1: db5.3-util, db5.3-doc, libdb5.3-java, libdb5.3-java-jni, libdb5.3, libdb5.3-stl-dev, db5.3, libdb5.3-stl, libdb5.3-sql-dev, libdb5.3-java-gcj, db5.3-sql-util, libdb5.3-java-dev, libdb5.3++, libdb5.3-sql, libdb5.3-tcl, libdb5.3++-dev, libdb5.3-dev