MGASA-2024-0380

Source
https://advisories.mageia.org/MGASA-2024-0380.html
Import Source
https://advisories.mageia.org/MGASA-2024-0380.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0380
Related
Published
2024-11-27T19:59:10Z
Modified
2024-11-27T19:31:53Z
Summary
Updated dcmtk packages fix security vulnerability
Details

A buffer overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component. (CVE-2024-27628)

References
Credits

Affected packages

Mageia:9 / dcmtk

Package

Name
dcmtk
Purl
pkg:rpm/mageia/dcmtk?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.7-4.2.mga9

Ecosystem specific

{
    "section": "core"
}