USN-4004-2

Source
https://ubuntu.com/security/notices/USN-4004-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4004-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4004-2
Upstream
Related
Published
2019-06-04T18:57:59.733584Z
Modified
2025-10-13T04:34:50Z
Summary
db5.3 vulnerability
Details

USN-4004-1 fixed a vulnerability in Berkeley DB. This update provides the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that Berkeley DB incorrectly handled certain inputs. An attacker could possibly use this issue to read sensitive information.

References

Affected packages

Ubuntu:Pro:14.04:LTS / db5.3

Package

Name
db5.3
Purl
pkg:deb/ubuntu/db5.3@5.3.28-3ubuntu3.1+esm1?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.28-3ubuntu3.1+esm1

Affected versions

5.*

5.3.21-2
5.3.28-2
5.3.28-3
5.3.28-3ubuntu1
5.3.28-3ubuntu2
5.3.28-3ubuntu3
5.3.28-3ubuntu3.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "db5.3-sql-util",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "db5.3-util",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3++",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3++-dev",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3-dev",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3-java",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3-java-dev",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3-java-gcj",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3-java-jni",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3-sql",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3-sql-dev",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3-stl",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3-stl-dev",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        },
        {
            "binary_name": "libdb5.3-tcl",
            "binary_version": "5.3.28-3ubuntu3.1+esm1"
        }
    ]
}

Database specific

cves_map

{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-8457"
        }
    ],
    "ecosystem": "Ubuntu:Pro:14.04:LTS"
}