USN-4004-2: Berkeley DB vulnerability

04 June 2019

Berkeley DB could be made to expose sensitive information.

Releases

Packages

  • db5.3 - Berkeley DB Utilities

Details

USN-4004-1 fixed a vulnerability in Berkeley DB. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that Berkeley DB incorrectly handled certain inputs.
An attacker could possibly use this issue to read sensitive information.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04

In general, a standard system update will make all the necessary changes.

References

Related notices

  • USN-4004-1: libdb5.3++, db5.3-doc, db5.3, libdb5.3++-dev, libdb5.3, libdb5.3-java-dev, libdb5.3-java-jni, libdb5.3-dev, libdb5.3-sql, libdb5.3-sql-dev, libdb5.3-java-gcj, libdb5.3-stl-dev, libdb5.3-stl, db5.3-util, libdb5.3-java, libdb5.3-tcl, db5.3-sql-util
  • USN-4019-1: sqlite3, libsqlite3-0, sqlite3-doc, libsqlite3-tcl, libsqlite3-dev, lemon
  • USN-4019-2: sqlite3, libsqlite3-0, sqlite3-doc, libsqlite3-tcl, libsqlite3-dev, lemon