Name | CVE-2024-6375 |
Description | A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
mongodb (PTS) | jessie | 1:2.4.10-5+deb8u1 | vulnerable |
stretch (security), stretch (lts), stretch | 1:3.2.11-2+deb9u2 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
mongodb | source | jessie | (unfixed) | end-of-life | ||
mongodb | source | stretch | (unfixed) | end-of-life | ||
mongodb | source | (unstable) | (unfixed) |