USN-4004-1 fixed a vulnerability in Berkeley DB. This update provides the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that Berkeley DB incorrectly handled certain inputs. An attacker could possibly use this issue to read sensitive information.
{
"binaries": [
{
"binary_name": "db5.3-sql-util",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "db5.3-util",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3++",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3++-dev",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3-dev",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3-java",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3-java-dev",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3-java-gcj",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3-java-jni",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3-sql",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3-sql-dev",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3-stl",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3-stl-dev",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
},
{
"binary_name": "libdb5.3-tcl",
"binary_version": "5.3.28-3ubuntu3.1+esm1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}