An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.
{ "binaries": [ { "binary_version": "3.0-2", "binary_name": "invesalius" }, { "binary_version": "3.0-2", "binary_name": "invesalius-bin" }, { "binary_version": "3.0-2", "binary_name": "invesalius-examples" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-42845.json"
{ "binaries": [ { "binary_version": "3.1.1-3", "binary_name": "invesalius" }, { "binary_version": "3.1.1-3", "binary_name": "invesalius-bin" }, { "binary_version": "3.1.1-3", "binary_name": "invesalius-examples" } ] }
{ "binaries": [ { "binary_version": "3.1.99992-3build2", "binary_name": "invesalius" }, { "binary_version": "3.1.99992-3build2", "binary_name": "invesalius-bin" }, { "binary_version": "3.1.99992-3build2", "binary_name": "invesalius-examples" } ] }
{ "binaries": [ { "binary_version": "3.1.99998-7", "binary_name": "invesalius" }, { "binary_version": "3.1.99998-7", "binary_name": "invesalius-bin" }, { "binary_version": "3.1.99998-7", "binary_name": "invesalius-examples" } ] }