First published: Tue Jun 04 2019(Updated: )
USN-4004-1 fixed a vulnerability in Berkeley DB. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details: It was discovered that Berkeley DB incorrectly handled certain inputs. An attacker could possibly use this issue to read sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/db5.3-util | <5.3.28-3ubuntu3.1+esm1 | 5.3.28-3ubuntu3.1+esm1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/libdb5.3-sql | <5.3.28-3ubuntu3.1+esm1 | 5.3.28-3ubuntu3.1+esm1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/db5.3-sql-util | <5.3.28-3ubuntu3.1+esm1 | 5.3.28-3ubuntu3.1+esm1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/libdb5.3-sql-dev | <5.3.28-3ubuntu3.1+esm1 | 5.3.28-3ubuntu3.1+esm1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/libdb5.3 | <5.3.28-3ubuntu3.1+esm1 | 5.3.28-3ubuntu3.1+esm1 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in USN-4004-2 is a security issue in Berkeley DB that allows an attacker to read sensitive information.
Ubuntu 14.04 is affected by USN-4004-2.
To fix the vulnerability in USN-4004-2, update the affected software to version 5.3.28-3ubuntu3.1+esm1 or later.
You can find more information about USN-4004-2 on the Ubuntu security website.
Yes, the CVE associated with USN-4004-2 is CVE-2019-8457.