Dave McDaniel discovered that the SQLite3 bindings for Node.js were susceptible to the execution of arbitrary JavaScript code if a binding parameter is a crafted object. For the stable distribution (bullseye), this problem has been fixed in version 5.0.0+ds1-1+deb11u2. We recommend that you upgrade your node-sqlite3 packages. For the detailed security status of node-sqlite3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/node-sqlite3
Dave McDaniel discovered that the SQLite3 bindings for Node.js were susceptible to the execution of arbitrary JavaScript code if a binding parameter is a crafted object.
For the stable distribution (bullseye), this problem has been fixed in version 5.0.0+ds1-1+deb11u2.
We recommend that you upgrade your node-sqlite3 packages.
For the detailed security status of node-sqlite3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/node-sqlite3