Jump to content

Advisories MDVSA-2009:344: perl-DBD-Pg


paul
 Share

Recommended Posts

Multiple vulnerabilities was discovered and corrected in perl-DBD-Pg:

 

Heap-based buffer overflow in the DBD::Pg module for Perl might allow

context-dependent attackers to execute arbitrary code via unspecified

input to an application that uses the getline and pg_getline functions

to read database rows.

 

Memory leak in the dequote_bytea function in quote.c in the DBD::Pg

(aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows

context-dependent attackers to cause a denial of service (memory

consumption) by fetching data with BYTEA columns (CVE-2009-1341).

 

Packages for 2008.0 are provided for Corporate Desktop 2008.0

customers.

 

This update provides a fix for these vulnerabilities.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...