Intel

AIKIDO-2025-10402

mongodb.libmongocrypt is vulnerable to Double Free

Double Free Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

18

Low Risk

This Affects:

c++mongodb.libmongocrypt
1.8.0 - 1.13.0
Fixed in 1.13.1

TL;DR

Affected versions of this package are vulnerable to integer overflow in absl::{flat,node}_hash_{set,map} during container creation or resizing via constructors, reserve(), or rehash(). These methods fail to enforce upper bounds on size arguments, potentially causing overflows when allocating the backing store and leading to out-of-bounds memory access. The fix introduces proper validation of size arguments and updates max_size() to reflect safe limits. While exploitation is considered difficult due to limited attacker control over container sizes, applications using untrusted input should upgrade to a patched version.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

mongodb.libmongocrypt is vulnerable to Double Free in versions 1.8.0 - 1.13.0.

How to fix this

Upgrade the mongodb.libmongocrypt library to the patch version.