USN-4004-1: Berkeley DB vulnerability
4 June 2019
Berkeley DB could be made to expose sensitive information.
Releases
Packages
- db5.3 - Berkeley DB Utilities
Details
It was discovered that Berkeley DB incorrectly handled certain inputs.
An attacker could possibly use this issue to read sensitive information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04
-
db5.3-sql-util
-
5.3.28+dfsg1-0.5ubuntu0.1
-
db5.3-util
-
5.3.28+dfsg1-0.5ubuntu0.1
-
libdb5.3
-
5.3.28+dfsg1-0.5ubuntu0.1
-
libdb5.3-sql
-
5.3.28+dfsg1-0.5ubuntu0.1
-
libdb5.3-sql-dev
-
5.3.28+dfsg1-0.5ubuntu0.1
Ubuntu 18.10
-
db5.3-sql-util
-
5.3.28+dfsg1-0.1ubuntu0.1
-
db5.3-util
-
5.3.28+dfsg1-0.1ubuntu0.1
-
libdb5.3
-
5.3.28+dfsg1-0.1ubuntu0.1
-
libdb5.3-sql
-
5.3.28+dfsg1-0.1ubuntu0.1
-
libdb5.3-sql-dev
-
5.3.28+dfsg1-0.1ubuntu0.1
Ubuntu 18.04
-
db5.3-sql-util
-
5.3.28-13.1ubuntu1.1
-
db5.3-util
-
5.3.28-13.1ubuntu1.1
-
libdb5.3
-
5.3.28-13.1ubuntu1.1
-
libdb5.3-sql
-
5.3.28-13.1ubuntu1.1
-
libdb5.3-sql-dev
-
5.3.28-13.1ubuntu1.1
Ubuntu 16.04
-
db5.3-sql-util
-
5.3.28-11ubuntu0.2
-
db5.3-util
-
5.3.28-11ubuntu0.2
-
libdb5.3
-
5.3.28-11ubuntu0.2
-
libdb5.3-sql
-
5.3.28-11ubuntu0.2
-
libdb5.3-sql-dev
-
5.3.28-11ubuntu0.2
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4004-2: db5.3-doc, libdb5.3, libdb5.3-java, libdb5.3-java-gcj, db5.3, libdb5.3-sql-dev, libdb5.3-stl, libdb5.3-sql, db5.3-util, libdb5.3-tcl, libdb5.3-dev, libdb5.3-java-dev, libdb5.3-stl-dev, libdb5.3-java-jni, db5.3-sql-util, libdb5.3++-dev, libdb5.3++
- USN-4019-1: lemon, libsqlite3-dev, libsqlite3-tcl, sqlite3, libsqlite3-0, sqlite3-doc
- USN-4019-2: lemon, libsqlite3-dev, libsqlite3-tcl, sqlite3, libsqlite3-0, sqlite3-doc