USN-4004-1 fixed a vulnerability in Berkeley DB. This update provides the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that Berkeley DB incorrectly handled certain inputs. An attacker could possibly use this issue to read sensitive information.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "db5.3-doc" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3-java-jni" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3-tcl" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3-java-dev" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3-dev" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "db5.3-util" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3-stl-dev" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3-sql" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3++-dev" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "db5.3-sql-util" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3++" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3-stl" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3-java-gcj" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3-sql-dev" }, { "binary_version": "5.3.28-3ubuntu3.1+esm1", "binary_name": "libdb5.3-java" } ] }