==========================================================================
Ubuntu Security Notice USN-4004-2
June 04, 2019
db5.3 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 ESM
Summary:
Berkeley DB could be made to expose sensitive information.
Software Description:
– db5.3: Berkeley DB Utilities
Details:
USN-4004-1 fixed a vulnerability in Berkeley DB. This update provides
the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that Berkeley DB incorrectly handled certain inputs.
An attacker could possibly use this issue to read sensitive
information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
db5.3-sql-util 5.3.28-3ubuntu3.1+esm1
db5.3-util 5.3.28-3ubuntu3.1+esm1
libdb5.3 5.3.28-3ubuntu3.1+esm1
libdb5.3-sql 5.3.28-3ubuntu3.1+esm1
libdb5.3-sql-dev 5.3.28-3ubuntu3.1+esm1
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-4004-2
https://usn.ubuntu.com/usn/usn-4004-1
CVE-2019-8457—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=XIH6
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-4004-1
June 04, 2019
db5.3 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 19.04
– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
Summary:
Berkeley DB could be made to expose sensitive information.
Software Description:
– db5.3: Berkeley DB Utilities
Details:
It was discovered that Berkeley DB incorrectly handled certain inputs.
An attacker could possibly use this issue to read sensitive
information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
db5.3-sql-util 5.3.28+dfsg1-0.5ubuntu0.1
db5.3-util 5.3.28+dfsg1-0.5ubuntu0.1
libdb5.3 5.3.28+dfsg1-0.5ubuntu0.1
libdb5.3-sql 5.3.28+dfsg1-0.5ubuntu0.1
libdb5.3-sql-dev 5.3.28+dfsg1-0.5ubuntu0.1
Ubuntu 18.10:
db5.3-sql-util 5.3.28+dfsg1-0.1ubuntu0.1
db5.3-util 5.3.28+dfsg1-0.1ubuntu0.1
libdb5.3 5.3.28+dfsg1-0.1ubuntu0.1
libdb5.3-sql 5.3.28+dfsg1-0.1ubuntu0.1
libdb5.3-sql-dev 5.3.28+dfsg1-0.1ubuntu0.1
Ubuntu 18.04 LTS:
db5.3-sql-util 5.3.28-13.1ubuntu1.1
db5.3-util 5.3.28-13.1ubuntu1.1
libdb5.3 5.3.28-13.1ubuntu1.1
libdb5.3-sql 5.3.28-13.1ubuntu1.1
libdb5.3-sql-dev 5.3.28-13.1ubuntu1.1
Ubuntu 16.04 LTS:
db5.3-sql-util 5.3.28-11ubuntu0.2
db5.3-util 5.3.28-11ubuntu0.2
libdb5.3 5.3.28-11ubuntu0.2
libdb5.3-sql 5.3.28-11ubuntu0.2
libdb5.3-sql-dev 5.3.28-11ubuntu0.2
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-4004-1
CVE-2019-8457
Package Information:
https://launchpad.net/ubuntu/+source/db5.3/5.3.28+dfsg1-0.5ubuntu0.1
https://launchpad.net/ubuntu/+source/db5.3/5.3.28+dfsg1-0.1ubuntu0.1
https://launchpad.net/ubuntu/+source/db5.3/5.3.28-13.1ubuntu1.1
https://launchpad.net/ubuntu/+source/db5.3/5.3.28-11ubuntu0.2—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=VTyc
—–END PGP SIGNATURE—–
—