Security Advisories (2)
CVE-2009-1341 (2009-04-30)

Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.

CVE-2012-1151 (2012-09-09)

Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function.

Changes for version 0.63

  • adapted to PostgreSQL-6.2: o $sth->rows as well as $sth->execute and $sth->do return the number of affected rows even for non-Select statements. o support for password authorization added, please check the man-page for pg_passwd.
  • the data_source parameter of the connect method accepts two additional parameters which are treated as host and port: DBI->connect("dbi:Pg:dbname:host:port", "uid", "pwd")
  • support for AutoCommit, please read the module documentation for impacts on your scripts !
  • more perl-ish handling of data type bool, please read the module documentation for impacts on your scripts !

Modules

PostgreSQL database driver for the DBI module

Provides

in Pg.pm
in Pg.pm
in pg_type/pg_type.pm
in Pg.pm