Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-0479

Опубликовано: 13 мая 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-0479: perl-DBD-Pg security update (MODERATE)

[1.49-2.el5_3.1]

  • fix CVE-2009-0663 and CVE-2009-1341
  • Resolves: #498000

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

perl-DBD-Pg

1.49-2.el5_3.1

Oracle Linux x86_64

perl-DBD-Pg

1.49-2.el5_3.1

Oracle Linux i386

perl-DBD-Pg

1.49-2.el5_3.1

Связанные CVE

Связанные уязвимости

ubuntu
около 16 лет назад

Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.

redhat
около 16 лет назад

Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.

nvd
около 16 лет назад

Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.

debian
около 16 лет назад

Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (a ...

ubuntu
около 16 лет назад

Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.