{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* SECURITY UPDATE: upsert retry in multi-document transactions causes crash\n     - debian/patches/CVE-2025-10060.patch: prevent DuplicateKey retry when\n       inside a multi-document transaction to avoid invariant failure.\n     - CVE-2025-10060",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776598017",
        "url": "https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776598017"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_docker/debian13/advisories/2026/clsa-2026_1776598017.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-19T11:27:37Z",
      "generator": {
        "date": "2026-04-19T11:27:37Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1776598017",
      "initial_release_date": "2026-04-19T11:27:37Z",
      "revision_history": [
        {
          "date": "2026-04-19T11:27:37Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix CVE(s): CVE-2025-10060"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Debian 13",
                "product": {
                  "name": "Debian 13",
                  "product_id": "Debian-13",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:debian:debian_linux:13:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Debian"
          }
        ],
        "category": "vendor",
        "name": "Software in the Public Interest, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64",
                "product": {
                  "name": "mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64",
                  "product_id": "mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb5-mongos@5.0.31-1%2Btuxcare.els4?arch=arm64&os_name=debian&os_version=13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64",
                "product": {
                  "name": "mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64",
                  "product_id": "mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb5-shell@5.0.31-1%2Btuxcare.els4?arch=arm64&os_name=debian&os_version=13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64",
                "product": {
                  "name": "mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64",
                  "product_id": "mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb5-server@5.0.31-1%2Btuxcare.els4?arch=arm64&os_name=debian&os_version=13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb5-0:5.0.31-1+tuxcare.els4.arm64",
                "product": {
                  "name": "mongodb5-0:5.0.31-1+tuxcare.els4.arm64",
                  "product_id": "mongodb5-0:5.0.31-1+tuxcare.els4.arm64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb5@5.0.31-1%2Btuxcare.els4?arch=arm64&os_name=debian&os_version=13"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "arm64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64",
                "product": {
                  "name": "mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64",
                  "product_id": "mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb5-mongos@5.0.31-1%2Btuxcare.els4?arch=amd64&os_name=debian&os_version=13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64",
                "product": {
                  "name": "mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64",
                  "product_id": "mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb5-shell@5.0.31-1%2Btuxcare.els4?arch=amd64&os_name=debian&os_version=13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64",
                "product": {
                  "name": "mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64",
                  "product_id": "mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb5-server@5.0.31-1%2Btuxcare.els4?arch=amd64&os_name=debian&os_version=13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mongodb5-0:5.0.31-1+tuxcare.els4.amd64",
                "product": {
                  "name": "mongodb5-0:5.0.31-1+tuxcare.els4.amd64",
                  "product_id": "mongodb5-0:5.0.31-1+tuxcare.els4.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/mongodb5@5.0.31-1%2Btuxcare.els4?arch=amd64&os_name=debian&os_version=13"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64 as a component of Debian 13",
          "product_id": "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64"
        },
        "product_reference": "mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64",
        "relates_to_product_reference": "Debian-13"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64 as a component of Debian 13",
          "product_id": "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64"
        },
        "product_reference": "mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64",
        "relates_to_product_reference": "Debian-13"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64 as a component of Debian 13",
          "product_id": "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64"
        },
        "product_reference": "mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64",
        "relates_to_product_reference": "Debian-13"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64 as a component of Debian 13",
          "product_id": "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64"
        },
        "product_reference": "mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64",
        "relates_to_product_reference": "Debian-13"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64 as a component of Debian 13",
          "product_id": "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64"
        },
        "product_reference": "mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64",
        "relates_to_product_reference": "Debian-13"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64 as a component of Debian 13",
          "product_id": "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64"
        },
        "product_reference": "mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64",
        "relates_to_product_reference": "Debian-13"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb5-0:5.0.31-1+tuxcare.els4.amd64 as a component of Debian 13",
          "product_id": "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.amd64"
        },
        "product_reference": "mongodb5-0:5.0.31-1+tuxcare.els4.amd64",
        "relates_to_product_reference": "Debian-13"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mongodb5-0:5.0.31-1+tuxcare.els4.arm64 as a component of Debian 13",
          "product_id": "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.arm64"
        },
        "product_reference": "mongodb5-0:5.0.31-1+tuxcare.els4.arm64",
        "relates_to_product_reference": "Debian-13"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-1849",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "description",
          "text": "MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce deeply nested documents. The issue arises in recursive functions because the server does not periodically check the depth of the expression.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.amd64",
          "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.arm64",
          "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64",
          "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64",
          "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64",
          "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64",
          "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64",
          "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-docker/cve/CVE-2026-1849"
        },
        {
          "category": "external",
          "summary": "https://jira.mongodb.org/browse/SERVER-102364",
          "url": "https://jira.mongodb.org/browse/SERVER-102364"
        }
      ],
      "release_date": "2026-02-10T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-19T11:27:00.228127Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776598017",
          "product_ids": [
            "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64"
          ],
          "url": "https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776598017"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-10060",
      "cwe": {
        "id": "CWE-672",
        "name": "Operation on a Resource after Expiration or Release"
      },
      "notes": [
        {
          "category": "description",
          "text": "MongoDB Server may allow upsert operations retried within a transaction to violate unique index constraints, potentially causing an invariant failure and server crash during commit. This issue may be triggered by improper WriteUnitOfWork state management.  This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22 and MongoDB Server v8.0 versions prior to 8.0.12",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.amd64",
          "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.arm64",
          "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64",
          "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64",
          "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64",
          "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64",
          "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64",
          "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-docker/cve/CVE-2025-10060"
        },
        {
          "category": "external",
          "summary": "https://jira.mongodb.org/browse/SERVER-95524",
          "url": "https://jira.mongodb.org/browse/SERVER-95524"
        }
      ],
      "release_date": "2025-09-05T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-19T11:27:00.228127Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776598017",
          "product_ids": [
            "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64"
          ],
          "url": "https://cve.tuxcare.com/els-docker/releases/CLSA-2026:1776598017"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-mongos-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-server-0:5.0.31-1+tuxcare.els4.arm64",
            "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.amd64",
            "Debian-13:mongodb5-shell-0:5.0.31-1+tuxcare.els4.arm64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}