MDVSA-2009:344 -- Mandriva perl-DBD-Pg
|ID: oval:org.secpod.oval:def:300505||Date: (C)2012-01-07 (M)2018-06-01|
|Class: PATCH||Family: unix|
Multiple vulnerabilities was discovered and corrected in perl-DBD-Pg: Heap-based buffer overflow in the DBD::Pg module for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows. Memory leak in the dequote_bytea function in quote.c in the DBD::Pg module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service by fetching data with BYTEA columns . Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. This update provides a fix for these vulnerabilities.
|Mandriva Linux 2008.0|