An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.
{ "binaries": [ { "binary_name": "invesalius", "binary_version": "3.0-2" }, { "binary_name": "invesalius-bin", "binary_version": "3.0-2" }, { "binary_name": "invesalius-examples", "binary_version": "3.0-2" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-42845.json"
{ "binaries": [ { "binary_name": "invesalius", "binary_version": "3.1.1-3" }, { "binary_name": "invesalius-bin", "binary_version": "3.1.1-3" }, { "binary_name": "invesalius-examples", "binary_version": "3.1.1-3" } ] }
{ "binaries": [ { "binary_name": "invesalius", "binary_version": "3.1.99992-3build2" }, { "binary_name": "invesalius-bin", "binary_version": "3.1.99992-3build2" }, { "binary_name": "invesalius-examples", "binary_version": "3.1.99992-3build2" } ] }
{ "binaries": [ { "binary_name": "invesalius", "binary_version": "3.1.99998-7" }, { "binary_name": "invesalius-bin", "binary_version": "3.1.99998-7" }, { "binary_name": "invesalius-examples", "binary_version": "3.1.99998-7" } ] }