USN-4004-1 fixed a vulnerability in Berkeley DB. This update provides the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that Berkeley DB incorrectly handled certain inputs. An attacker could possibly use this issue to read sensitive information.
{
"binaries": [
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "db5.3-sql-util"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "db5.3-util"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3++"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3++-dev"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3-dev"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3-java"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3-java-dev"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3-java-gcj"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3-java-jni"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3-sql"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3-sql-dev"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3-stl"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3-stl-dev"
},
{
"binary_version": "5.3.28-3ubuntu3.1+esm1",
"binary_name": "libdb5.3-tcl"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}