An issue in dc2niix before v.1.0.20240202 allows a local attacker to execute arbitrary code via the generated file name is not properly escaped and injected into a system call when certain types of compression are used.
{ "binaries": [ { "binary_name": "dcm2niix", "binary_version": "1.0.20171215-1" } ] }
{ "binaries": [ { "binary_name": "dcm2niix", "binary_version": "1.0.20181125-1build1" } ] }
{ "binaries": [ { "binary_name": "dcm2niix", "binary_version": "1.0.20211006-1build1" } ] }
{ "binaries": [ { "binary_name": "dcm2niix", "binary_version": "1.0.20220720-1build1" } ] }
{ "binaries": [ { "binary_name": "dcm2niix", "binary_version": "1.0.20240202-1build1" } ] }