CVE-2024-42845

NameCVE-2024-42845
DescriptionAn eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1082875

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
invesalius (PTS)jessie3.0~b5-4vulnerable
stretch3.0.1-1vulnerable
buster3.1.99992-3vulnerable
bullseye3.1.99994-1vulnerable
bookworm3.1.99998-4vulnerable
trixie3.1.99998-5vulnerable
sid3.1.99998-6vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
invesaliussourcejessie(unfixed)end-of-life
invesaliussourcestretch(unfixed)end-of-life
invesaliussourcebuster(unfixed)end-of-life
invesaliussource(unstable)(unfixed)1082875

Notes

[bookworm] - invesalius <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - invesalius <postponed> (Minor issue)
https://github.com/partywavesec/invesalius3_vulnerabilities/tree/main/CVE-2024-42845

Search for package or bug name: Reporting problems