CVE-2024-29421

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-29421
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-29421.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-29421
Related
Published
2024-05-22T18:15:09Z
Modified
2024-09-18T03:26:13.627085Z
Summary
[none]
Details

xmedcon 0.23.0 and fixed in v.0.24.0 is vulnerable to Buffer Overflow via libs/dicom/basic.c which allows an attacker to execute arbitrary code.

References

Affected packages

Debian:11 / xmedcon

Package

Name
xmedcon
Purl
pkg:deb/debian/xmedcon?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.16.3+dfsg-1+deb11u1

Affected versions

0.*

0.16.3+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / xmedcon

Package

Name
xmedcon
Purl
pkg:deb/debian/xmedcon?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.23.0-gtk3+dfsg-1+deb12u1

Affected versions

0.*

0.23.0-gtk3+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / xmedcon

Package

Name
xmedcon
Purl
pkg:deb/debian/xmedcon?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.24.0-gtk3+dfsg-1

Affected versions

0.*

0.23.0-gtk3+dfsg-1
0.23.0-gtk3+dfsg-1.1~exp1
0.23.0-gtk3+dfsg-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}