Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 838253 (CVE-2021-32040, CVE-2022-24272) - dev-db/mongodb: stack overflow
Summary: dev-db/mongodb: stack overflow
Status: CONFIRMED
Alias: CVE-2021-32040, CVE-2022-24272
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-04-13 19:30 UTC by John Helmert III
Modified: 2022-04-21 22:24 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-13 19:30:14 UTC
CVE-2021-32040 (https://jira.mongodb.org/browse/SERVER-58203):
https://jira.mongodb.org/browse/SERVER-60218
https://jira.mongodb.org/browse/SERVER-59299

It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB versions prior to 5.0.4, 4.4.11, 4.2.16.

Fix in 5.0.4, 4.4.11, 4.2.16, please stabilize fixed versions and bump
the 4.4.x branch.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-21 22:24:52 UTC
CVE-2022-24272 (https://jira.mongodb.org/browse/SERVER-63968):

An authenticated user may trigger an invariant assertion during command dispatch due to incorrect validation on the $external database. This may result in mongod denial of service or server crash. This issue affects: MongoDB Inc. MongoDB Server v5.0 versions, prior to and including v5.0.6.