[SECURITY] [DLA 3889-1] pymongo security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3889-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Bastien Roucariès
September 16, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : pymongo
Version : 3.11.0-1+deb11u1
CVE ID : CVE-2024-5629
pymongo a python interface to the MongoDB document-oriented database
was vulnerable.
An out-of-bounds read in the 'bson' module allowed deserialization of
malformed BSON provided by a Server to raise an exception which may contain
arbitrary application memory.
For Debian 11 bullseye, this problem has been fixed in version
3.11.0-1+deb11u1.
We recommend that you upgrade your pymongo packages.
For the detailed security status of pymongo please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pymongo
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=6ZiE
-----END PGP SIGNATURE-----
Reply to: