| Name | CVE-2024-3566 | 
| Description | A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied. | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status | 
|---|
| nodejs (PTS) | bullseye | 12.22.12~dfsg-1~deb11u4 | fixed | 
 | bullseye (security) | 12.22.12~dfsg-1~deb11u7 | fixed | 
 | bookworm, bookworm (security) | 18.20.4+dfsg-1~deb12u1 | fixed | 
 | trixie | 20.19.2+dfsg-1 | fixed | 
 | forky, sid | 20.19.5+dfsg+~cs20.19.12-4 | fixed | 
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs | 
|---|
| nodejs | source | (unstable) | (not affected) |  |  |  | 
Notes
- nodejs <not-affected> (Only affects Windows)