USN-4004-2

See a problem?
Source
https://ubuntu.com/security/notices/USN-4004-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4004-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4004-2
Related
Published
2019-06-04T18:57:59.733584Z
Modified
2019-06-04T18:57:59.733584Z
Summary
db5.3 vulnerability
Details

USN-4004-1 fixed a vulnerability in Berkeley DB. This update provides the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that Berkeley DB incorrectly handled certain inputs. An attacker could possibly use this issue to read sensitive information.

References

Affected packages

Ubuntu:14.04:LTS / db5.3

Package

Name
db5.3
Purl
pkg:deb/ubuntu/db5.3@5.3.28-3ubuntu3.1+esm1?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.28-3ubuntu3.1+esm1

Affected versions

5.*

5.3.21-2
5.3.28-2
5.3.28-3
5.3.28-3ubuntu1
5.3.28-3ubuntu2
5.3.28-3ubuntu3
5.3.28-3ubuntu3.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "libdb5.3++": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3-dev": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3-tcl": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3-java-dev": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3-java-jni": "5.3.28-3ubuntu3.1+esm1",
            "db5.3-sql-util": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3-stl-dev": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3-java": "5.3.28-3ubuntu3.1+esm1",
            "db5.3-util": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3++-dev": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3-java-gcj": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3-stl": "5.3.28-3ubuntu3.1+esm1",
            "db5.3-doc": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3-sql": "5.3.28-3ubuntu3.1+esm1",
            "libdb5.3-sql-dev": "5.3.28-3ubuntu3.1+esm1"
        }
    ]
}