USN-3489-2: Berkeley DB vulnerability
21 November 2017
Berkeley DB could be made to expose sensitive information.
Releases
Packages
Details
USN-3489-1 fixed a vulnerability in Berkeley DB. This update provides the
corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that Berkeley DB incorrectly handled certain configuration files.
An attacker could possibly use this issue to read sensitive information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
-
db4.8-util
-
4.8.30-11ubuntu1.1
-
db5.1-util
-
5.1.25-11ubuntu0.1
-
libdb4.8
-
4.8.30-11ubuntu1.1
-
libdb5.1
-
5.1.25-11ubuntu0.1
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3489-1: db5.3-sql-util, libdb5.3-dev, libdb5.3-java-gcj, libdb5.3++-dev, libdb5.3++, db5.3, libdb5.3-java-dev, libdb5.3-tcl, db5.3-doc, db5.3-util, libdb5.3-java, libdb5.3-java-jni, libdb5.3-stl-dev, libdb5.3-sql-dev, libdb5.3-sql, libdb5.3, libdb5.3-stl