Vulnerability Description
An out-of-bounds read in the 'bson' module of PyMongo 4.6.2 or earlier allows deserialization of malformed BSON provided by a Server to raise an exception which may contain arbitrary application memory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mongodb | Pymongo | < 4.6.3 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://jira.mongodb.org/browse/PYTHON-4305Issue TrackingPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/06/msg00007.htmlThird Party Advisory
- https://jira.mongodb.org/browse/PYTHON-4305Issue TrackingPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/06/msg00007.htmlThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/09/msg00032.html
FAQ
What is CVE-2024-5629?
CVE-2024-5629 is a vulnerability with a CVSS score of 4.7 (MEDIUM). An out-of-bounds read in the 'bson' module of PyMongo 4.6.2 or earlier allows deserialization of malformed BSON provided by a Server to raise an exception which may contain arbitrary application memor...
How severe is CVE-2024-5629?
CVE-2024-5629 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-5629?
Check the references section above for vendor advisories and patch information. Affected products include: Mongodb Pymongo, Debian Debian Linux.