Debian 9975 Published by

A node-qs security update has been released for Debian GNU/Linux 10 LTS to address a vulnerability.



DLA 3299-1: node-qs security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-3299-1 debian-lts@lists.debian.org
  https://www.debian.org/lts/security/ Guilhem Moulin
January 30, 2023   https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : node-qs
Version : 6.5.2-1+deb10u1
CVE ID : CVE-2022-24999

Nathanael Braun and Johan Brissaud discovered a prototype poisoning
vulnerability in node-qs, a Node.js module to parse and stringify query
strings. node-qs 6.5.x before 6.5.3 allows for instance the creation of
array-like objects by setting an Array in the `__ proto__` property; the
resulting Objects inherit the `Array` prototype, thereby exposing native
Array functions.

For Debian 10 buster, this problem has been fixed in version
6.5.2-1+deb10u1.

We recommend that you upgrade your node-qs packages.

For the detailed security status of node-qs please refer to
its security tracker page at:
  https://security-tracker.debian.org/tracker/node-qs

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://wiki.debian.org/LTS