{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* SECURITY UPDATE: Double-free/use-after-free in SBE hash lookup when\n     duplicate key causes spilling during $lookup aggregation\n     - debian/patches/CVE-2026-4358.patch: Remove MaterializedRow local variable\n       in addHashTableEntry() that wrongly takes ownership of view values before\n       spilling, causing double-free when the destructor runs\n     - CVE-2026-4358",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776607197",
        "url": "https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776607197"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_docker/debian12/advisories/2026/clsa-2026_1776607197.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-19T14:00:37Z",
      "generator": {
        "date": "2026-04-19T14:00:37Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1776607197",
      "initial_release_date": "2026-04-19T14:00:37Z",
      "revision_history": [
        {
          "date": "2026-04-19T14:00:37Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix CVE(s): CVE-2026-4358"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Debian 12",
                "product": {
                  "name": "Debian 12",
                  "product_id": "Debian-12",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:debian:debian_linux:12:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Debian"
          }
        ],
        "category": "vendor",
        "name": "Software in the Public Interest, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64",
                "product": {
                  "name": "mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64",
                  "product_id": "mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb6-shell@6.0.26-1%2Btuxcare.els6?arch=arm64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64",
                "product": {
                  "name": "mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64",
                  "product_id": "mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb6-mongos@6.0.26-1%2Btuxcare.els6?arch=arm64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb6-0:6.0.26-1+tuxcare.els6.arm64",
                "product": {
                  "name": "mongodb6-0:6.0.26-1+tuxcare.els6.arm64",
                  "product_id": "mongodb6-0:6.0.26-1+tuxcare.els6.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb6@6.0.26-1%2Btuxcare.els6?arch=arm64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64",
                "product": {
                  "name": "mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64",
                  "product_id": "mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb6-server@6.0.26-1%2Btuxcare.els6?arch=arm64&os_name=debian&os_version=12"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "arm64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64",
                "product": {
                  "name": "mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64",
                  "product_id": "mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb6-shell@6.0.26-1%2Btuxcare.els6?arch=amd64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64",
                "product": {
                  "name": "mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64",
                  "product_id": "mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb6-mongos@6.0.26-1%2Btuxcare.els6?arch=amd64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb6-0:6.0.26-1+tuxcare.els6.amd64",
                "product": {
                  "name": "mongodb6-0:6.0.26-1+tuxcare.els6.amd64",
                  "product_id": "mongodb6-0:6.0.26-1+tuxcare.els6.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb6@6.0.26-1%2Btuxcare.els6?arch=amd64&os_name=debian&os_version=12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64",
                "product": {
                  "name": "mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64",
                  "product_id": "mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb6-server@6.0.26-1%2Btuxcare.els6?arch=amd64&os_name=debian&os_version=12"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64"
        },
        "product_reference": "mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64"
        },
        "product_reference": "mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64"
        },
        "product_reference": "mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64"
        },
        "product_reference": "mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb6-0:6.0.26-1+tuxcare.els6.amd64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.amd64"
        },
        "product_reference": "mongodb6-0:6.0.26-1+tuxcare.els6.amd64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb6-0:6.0.26-1+tuxcare.els6.arm64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.arm64"
        },
        "product_reference": "mongodb6-0:6.0.26-1+tuxcare.els6.arm64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64"
        },
        "product_reference": "mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64",
        "relates_to_product_reference": "Debian-12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64 as a component of Debian 12",
          "product_id": "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64"
        },
        "product_reference": "mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64",
        "relates_to_product_reference": "Debian-12"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-4358",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A specially crafted aggregation query with $lookup by an authenticated user with write privileges can cause a double-free or use-after-free memory issue in the slot-based execution (SBE) engine when an in-memory hash table is spilled to disk.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.amd64",
          "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.arm64",
          "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64",
          "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64",
          "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64",
          "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64",
          "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64",
          "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-docker/cve/CVE-2026-4358"
        },
        {
          "category": "external",
          "summary": "https://jira.mongodb.org/browse/SERVER-118849",
          "url": "https://jira.mongodb.org/browse/SERVER-118849"
        }
      ],
      "release_date": "2026-03-17T20:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-19T14:00:00.337748Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776607197",
          "product_ids": [
            "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64"
          ],
          "url": "https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776607197"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-13644",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "description",
          "text": "MongoDB Server may experience an invariant failure during batched delete operations when handling documents. The issue arises when the server mistakenly assumes the presence of multiple documents in a batch based solely on document size exceeding BSONObjMaxSize. This issue affects MongoDB Server v7.0 versions prior to 7.0.26, MongoDB Server v8.0 versions prior to 8.0.13, and MongoDB Server v8.1 versions prior to 8.1.2",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.amd64",
          "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.arm64",
          "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64",
          "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64",
          "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64",
          "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64",
          "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64",
          "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-docker/cve/CVE-2025-13644"
        },
        {
          "category": "external",
          "summary": "https://jira.mongodb.org/browse/SERVER-101180",
          "url": "https://jira.mongodb.org/browse/SERVER-101180"
        }
      ],
      "release_date": "2025-11-25T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-19T14:00:00.337748Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776607197",
          "product_ids": [
            "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64"
          ],
          "url": "https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776607197"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-mongos-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-server-0:6.0.26-1+tuxcare.els6.arm64",
            "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.amd64",
            "Debian-12:mongodb6-shell-0:6.0.26-1+tuxcare.els6.arm64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}