Mandrake Security Advisory MDVSA-2009:255 (perl-DBD-Pg)

Summary
The remote host is missing an update to perl-DBD-Pg announced via advisory MDVSA-2009:255.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:255
Insight
A vulnerability was discovered and corrected in perl-DBD-Pg: Heap-based buffer overflow in the DBD::Pg module for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows. This update provides a fix for this vulnerability. Affected: Corporate 4.0