UBUNTU-CVE-2024-42845

Source
https://ubuntu.com/security/CVE-2024-42845
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-42845.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-42845
Related
Published
2024-08-23T19:15:00Z
Modified
2024-11-05T04:36:13Z
Summary
[none]
Details

An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.

References

Affected packages

Ubuntu:Pro:16.04:LTS / invesalius

Package

Name
invesalius
Purl
pkg:deb/ubuntu/invesalius?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.0-1
3.0-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / invesalius

Package

Name
invesalius
Purl
pkg:deb/ubuntu/invesalius?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.1.1-1build1
3.1.1-3

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / invesalius

Package

Name
invesalius
Purl
pkg:deb/ubuntu/invesalius?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.1.99992-3
3.1.99992-3build1
3.1.99992-3build2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}