Mandrake Security Advisory MDVSA-2009:255 (perl-DBD-Pg)

The remote host is missing an update to perl-DBD-Pg announced via advisory MDVSA-2009:255.
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
A vulnerability was discovered and corrected in perl-DBD-Pg: Heap-based buffer overflow in the DBD::Pg module for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows. This update provides a fix for this vulnerability. Affected: Corporate 4.0