CVE-2024-5629

NameCVE-2024-5629
DescriptionAn out-of-bounds read in the 'bson' module of PyMongo 4.6.2 or earlier allows deserialization of malformed BSON provided by a Server to raise an exception which may contain arbitrary application memory.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3832-1, DLA-3889-1, ELA-1111-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pymongo (PTS)jessie, jessie (lts)2.7.2-1+deb8u1fixed
stretch (lts), stretch3.4.0-1+deb9u1fixed
buster (security), buster, buster (lts)3.7.1-1.1+deb10u1fixed
bullseye3.11.0-1vulnerable
bullseye (security)3.11.0-1+deb11u1fixed
bookworm3.11.0-1+deb12u1fixed
trixie4.10.1-2fixed
sid4.10.1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pymongosourcejessie2.7.2-1+deb8u1ELA-1111-1
pymongosourcestretch3.4.0-1+deb9u1ELA-1111-1
pymongosourcebuster3.7.1-1.1+deb10u1DLA-3832-1
pymongosourcebullseye3.11.0-1+deb11u1DLA-3889-1
pymongosourcebookworm3.11.0-1+deb12u1
pymongosource(unstable)4.7.3-1

Notes

https://jira.mongodb.org/browse/PYTHON-4305
https://github.com/mongodb/mongo-python-driver/pull/1564

Search for package or bug name: Reporting problems