USN-4004-1 fixed a vulnerability in Berkeley DB. This update provides the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that Berkeley DB incorrectly handled certain inputs. An attacker could possibly use this issue to read sensitive information.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libdb5.3", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "db5.3-doc", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3-java-jni", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3-tcl", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3-java-dev", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3-dev", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "db5.3-util", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3-stl-dev", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3-sql", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3++-dev", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "db5.3-sql-util", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3++", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3-stl", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3-java-gcj", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3-sql-dev", "binary_version": "5.3.28-3ubuntu3.1+esm1" }, { "binary_name": "libdb5.3-java", "binary_version": "5.3.28-3ubuntu3.1+esm1" } ] }