A quick status:
A new release that includes the corrective changes will be available soon.
I’m not a security expert, so it’s difficult for me to assess precisely how exploitable this is in the archive/your environment without running the POC. The critical factor is whether the vulnerable OpenCV decode-with-buffer code path is actually reachable from the way files are handled in your setup.
Because dcm4che/Weasis use a forked OpenCV and rely on specific JNI wrappers, mixing an older dcm4che version with newer OpenCV binaries is not recommended — it frequently breaks the wrapping/ABI and can cause runtime failures.