{
  "document": {
    "aggregate_severity": {
      "text": "Critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* SECURITY UPDATE: CRL validation only checked leaf certificate\n     - debian/patches/CVE-2025-3085.patch: add X509_V_FLAG_CRL_CHECK_ALL flag\n       in _setupCRL() to validate entire certificate chain against CRL, not\n       just the leaf certificate. Simplify CRL import log message.\n     - CVE-2025-3085",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776079135",
        "url": "https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776079135"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_docker/debian12/advisories/2026/clsa-2026_1776079135.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-13T11:19:29Z",
      "generator": {
        "date": "2026-04-13T11:19:29Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1776079135",
      "initial_release_date": "2026-04-13T11:19:29Z",
      "revision_history": [
        {
          "date": "2026-04-13T11:19:29Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix CVE(s): CVE-2025-3085"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Debian 12",
                "product": {
                  "name": "Debian 12",
                  "product_id": "Debian-12",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:debian:debian_linux:12:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Debian"
          }
        ],
        "category": "vendor",
        "name": "Software in the Public Interest, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mongodb42-mongos-0:4.2.25-1+tuxcare.els4.amd64",
                "product": {
                  "name": "mongodb42-mongos-0:4.2.25-1+tuxcare.els4.amd64",
                  "product_id": "mongodb42-mongos-0:4.2.25-1+tuxcare.els4.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb42-mongos@4.2.25-1%2Btuxcare.els4?arch=amd64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb42-server-0:4.2.25-1+tuxcare.els4.amd64",
                "product": {
                  "name": "mongodb42-server-0:4.2.25-1+tuxcare.els4.amd64",
                  "product_id": "mongodb42-server-0:4.2.25-1+tuxcare.els4.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb42-server@4.2.25-1%2Btuxcare.els4?arch=amd64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb42-shell-0:4.2.25-1+tuxcare.els4.amd64",
                "product": {
                  "name": "mongodb42-shell-0:4.2.25-1+tuxcare.els4.amd64",
                  "product_id": "mongodb42-shell-0:4.2.25-1+tuxcare.els4.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb42-shell@4.2.25-1%2Btuxcare.els4?arch=amd64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb42-0:4.2.25-1+tuxcare.els4.amd64",
                "product": {
                  "name": "mongodb42-0:4.2.25-1+tuxcare.els4.amd64",
                  "product_id": "mongodb42-0:4.2.25-1+tuxcare.els4.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb42@4.2.25-1%2Btuxcare.els4?arch=amd64&os_name=debian&os_version=12"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mongodb42-mongos-0:4.2.25-1+tuxcare.els4.arm64",
                "product": {
                  "name": "mongodb42-mongos-0:4.2.25-1+tuxcare.els4.arm64",
                  "product_id": "mongodb42-mongos-0:4.2.25-1+tuxcare.els4.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb42-mongos@4.2.25-1%2Btuxcare.els4?arch=arm64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb42-server-0:4.2.25-1+tuxcare.els4.arm64",
                "product": {
                  "name": "mongodb42-server-0:4.2.25-1+tuxcare.els4.arm64",
                  "product_id": "mongodb42-server-0:4.2.25-1+tuxcare.els4.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb42-server@4.2.25-1%2Btuxcare.els4?arch=arm64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb42-shell-0:4.2.25-1+tuxcare.els4.arm64",
                "product": {
                  "name": "mongodb42-shell-0:4.2.25-1+tuxcare.els4.arm64",
                  "product_id": "mongodb42-shell-0:4.2.25-1+tuxcare.els4.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb42-shell@4.2.25-1%2Btuxcare.els4?arch=arm64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb42-0:4.2.25-1+tuxcare.els4.arm64",
                "product": {
                  "name": "mongodb42-0:4.2.25-1+tuxcare.els4.arm64",
                  "product_id": "mongodb42-0:4.2.25-1+tuxcare.els4.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb42@4.2.25-1%2Btuxcare.els4?arch=arm64&os_name=debian&os_version=12"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "arm64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb42-mongos-0:4.2.25-1+tuxcare.els4.amd64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb42-mongos-0:4.2.25-1+tuxcare.els4.amd64"
        },
        "product_reference": "mongodb42-mongos-0:4.2.25-1+tuxcare.els4.amd64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb42-mongos-0:4.2.25-1+tuxcare.els4.arm64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb42-mongos-0:4.2.25-1+tuxcare.els4.arm64"
        },
        "product_reference": "mongodb42-mongos-0:4.2.25-1+tuxcare.els4.arm64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb42-server-0:4.2.25-1+tuxcare.els4.amd64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb42-server-0:4.2.25-1+tuxcare.els4.amd64"
        },
        "product_reference": "mongodb42-server-0:4.2.25-1+tuxcare.els4.amd64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb42-server-0:4.2.25-1+tuxcare.els4.arm64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb42-server-0:4.2.25-1+tuxcare.els4.arm64"
        },
        "product_reference": "mongodb42-server-0:4.2.25-1+tuxcare.els4.arm64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb42-shell-0:4.2.25-1+tuxcare.els4.arm64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb42-shell-0:4.2.25-1+tuxcare.els4.arm64"
        },
        "product_reference": "mongodb42-shell-0:4.2.25-1+tuxcare.els4.arm64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb42-shell-0:4.2.25-1+tuxcare.els4.amd64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb42-shell-0:4.2.25-1+tuxcare.els4.amd64"
        },
        "product_reference": "mongodb42-shell-0:4.2.25-1+tuxcare.els4.amd64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb42-0:4.2.25-1+tuxcare.els4.arm64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb42-0:4.2.25-1+tuxcare.els4.arm64"
        },
        "product_reference": "mongodb42-0:4.2.25-1+tuxcare.els4.arm64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb42-0:4.2.25-1+tuxcare.els4.amd64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb42-0:4.2.25-1+tuxcare.els4.amd64"
        },
        "product_reference": "mongodb42-0:4.2.25-1+tuxcare.els4.amd64",
        "relates_to_product_reference": "Debian-12"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-3085",
      "cwe": {
        "id": "CWE-299",
        "name": "Improper Check for Certificate Revocation"
      },
      "notes": [
        {
          "category": "description",
          "text": "A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer's certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.\nRequired Configuration : MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-12:mongodb42-0:4.2.25-1+tuxcare.els4.amd64",
          "Debian-12:mongodb42-0:4.2.25-1+tuxcare.els4.arm64",
          "Debian-12:mongodb42-mongos-0:4.2.25-1+tuxcare.els4.amd64",
          "Debian-12:mongodb42-mongos-0:4.2.25-1+tuxcare.els4.arm64",
          "Debian-12:mongodb42-server-0:4.2.25-1+tuxcare.els4.amd64",
          "Debian-12:mongodb42-server-0:4.2.25-1+tuxcare.els4.arm64",
          "Debian-12:mongodb42-shell-0:4.2.25-1+tuxcare.els4.amd64",
          "Debian-12:mongodb42-shell-0:4.2.25-1+tuxcare.els4.arm64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-docker/cve/CVE-2025-3085"
        },
        {
          "category": "external",
          "summary": "https://jira.mongodb.org/browse/SERVER-95445",
          "url": "https://jira.mongodb.org/browse/SERVER-95445"
        }
      ],
      "release_date": "2025-04-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-13T11:18:57.779499Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776079135",
          "product_ids": [
            "Debian-12:mongodb42-0:4.2.25-1+tuxcare.els4.amd64",
            "Debian-12:mongodb42-0:4.2.25-1+tuxcare.els4.arm64",
            "Debian-12:mongodb42-mongos-0:4.2.25-1+tuxcare.els4.amd64",
            "Debian-12:mongodb42-mongos-0:4.2.25-1+tuxcare.els4.arm64",
            "Debian-12:mongodb42-server-0:4.2.25-1+tuxcare.els4.amd64",
            "Debian-12:mongodb42-server-0:4.2.25-1+tuxcare.els4.arm64",
            "Debian-12:mongodb42-shell-0:4.2.25-1+tuxcare.els4.amd64",
            "Debian-12:mongodb42-shell-0:4.2.25-1+tuxcare.els4.arm64"
          ],
          "url": "https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776079135"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Debian-12:mongodb42-0:4.2.25-1+tuxcare.els4.amd64",
            "Debian-12:mongodb42-0:4.2.25-1+tuxcare.els4.arm64",
            "Debian-12:mongodb42-mongos-0:4.2.25-1+tuxcare.els4.amd64",
            "Debian-12:mongodb42-mongos-0:4.2.25-1+tuxcare.els4.arm64",
            "Debian-12:mongodb42-server-0:4.2.25-1+tuxcare.els4.amd64",
            "Debian-12:mongodb42-server-0:4.2.25-1+tuxcare.els4.arm64",
            "Debian-12:mongodb42-shell-0:4.2.25-1+tuxcare.els4.amd64",
            "Debian-12:mongodb42-shell-0:4.2.25-1+tuxcare.els4.arm64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ]
    }
  ]
}