It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and MongoDB Server v4.2 versions prior to 4.2.16. Workaround: >= v4.2.16 users and all v4.4 users can add the --setParameter internalPipelineLengthLimit=50 instead of the default 1000 to mongod at startup to prevent a crash.
{
"binaries": [
{
"binary_name": "mongodb",
"binary_version": "1:2.4.9-1ubuntu2"
},
{
"binary_name": "mongodb-clients",
"binary_version": "1:2.4.9-1ubuntu2"
},
{
"binary_name": "mongodb-dev",
"binary_version": "1:2.4.9-1ubuntu2"
},
{
"binary_name": "mongodb-server",
"binary_version": "1:2.4.9-1ubuntu2"
}
]
}
{
"binaries": [
{
"binary_name": "mongodb",
"binary_version": "1:3.6.3-0ubuntu1.4"
},
{
"binary_name": "mongodb-clients",
"binary_version": "1:3.6.3-0ubuntu1.4"
},
{
"binary_name": "mongodb-server",
"binary_version": "1:3.6.3-0ubuntu1.4"
},
{
"binary_name": "mongodb-server-core",
"binary_version": "1:3.6.3-0ubuntu1.4"
}
]
}
{
"binaries": [
{
"binary_name": "mongodb",
"binary_version": "1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.3"
},
{
"binary_name": "mongodb-clients",
"binary_version": "1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.3"
},
{
"binary_name": "mongodb-server",
"binary_version": "1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.3"
},
{
"binary_name": "mongodb-server-core",
"binary_version": "1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.3"
}
]
}