-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3785-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Adrian Bunk April 09, 2024 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : gtkwave Version : 3.3.98+really3.3.118-0+deb10u1 CVE ID : CVE-2023-32650 CVE-2023-34087 CVE-2023-34436 CVE-2023-35004 CVE-2023-35057 CVE-2023-35128 CVE-2023-35702 CVE-2023-35703 CVE-2023-35704 CVE-2023-35955 CVE-2023-35956 CVE-2023-35957 CVE-2023-35958 CVE-2023-35959 CVE-2023-35960 CVE-2023-35961 CVE-2023-35962 CVE-2023-35963 CVE-2023-35964 CVE-2023-35969 CVE-2023-35970 CVE-2023-35989 CVE-2023-35992 CVE-2023-35994 CVE-2023-35995 CVE-2023-35996 CVE-2023-35997 CVE-2023-36746 CVE-2023-36747 CVE-2023-36861 CVE-2023-36864 CVE-2023-36915 CVE-2023-36916 CVE-2023-37282 CVE-2023-37416 CVE-2023-37417 CVE-2023-37418 CVE-2023-37419 CVE-2023-37420 CVE-2023-37442 CVE-2023-37443 CVE-2023-37444 CVE-2023-37445 CVE-2023-37446 CVE-2023-37447 CVE-2023-37573 CVE-2023-37574 CVE-2023-37575 CVE-2023-37576 CVE-2023-37577 CVE-2023-37578 CVE-2023-37921 CVE-2023-37922 CVE-2023-37923 CVE-2023-38583 CVE-2023-38618 CVE-2023-38619 CVE-2023-38620 CVE-2023-38621 CVE-2023-38622 CVE-2023-38623 CVE-2023-38648 CVE-2023-38649 CVE-2023-38650 CVE-2023-38651 CVE-2023-38652 CVE-2023-38653 CVE-2023-38657 CVE-2023-39234 CVE-2023-39235 CVE-2023-39270 CVE-2023-39271 CVE-2023-39272 CVE-2023-39273 CVE-2023-39274 CVE-2023-39275 CVE-2023-39316 CVE-2023-39317 CVE-2023-39413 CVE-2023-39414 CVE-2023-39443 CVE-2023-39444 Debian Bug : 1060407 Multiple security issues have been fixed in the waveform viewer GTKWave by upgrading to a more recent upstream version. For Debian 10 buster, these problems have been fixed in version 3.3.98+really3.3.118-0+deb10u1. We recommend that you upgrade your gtkwave packages. For the detailed security status of gtkwave please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gtkwave Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmYVo/gACgkQiNJCh6LY mLEsGg/9H3b0Nz25biz7BeN8mR7+qT2VLJ/W/y34CIXm5dpa7E8WiB6M7D1pGvLT +S6VnuR0+nHIPEsMG6gBi+Uv9wdvDAJm1FDesLRFa2TJmzQvhZ4JB6cXbRT+qZh/ Z51Qojvps+p1aY+BtanckR9Dk2V1kYiIqHOfUEjwYKrIeCPAyKXpTKu5U3N/Mz8n DE59xfnjiTyuRpR8lFY4418MywRNr2tya6OU/YcS1Ym9VbRyevOrSISPDqZi1vRR dVaRqCWDGjSzFwQ32d8AYsNwglzB3gHZjafFsi8OfgTNvO2H08Gld3COzh3R9YKw luBM9wH+Vysh2W4mQyJSibM8ZuKyX/Pyj8uGnrNuYnvYpF/2mr2EmvKtnP2CKFQI A1qqajFVtih/gNi6Y1iGjyRPI888ySIoxVuv13x1c3yS0MaY4ZPK/qplV4WfHnwl uSSEwOk68Ux+4YkNQeH01paie/2a6XBhtsNuvIl1SEVH4XY4Ngv7GRjbu6O25Cvs u8eSslfqUINF2pJiN35dMYeUMvjPnXgUMyre629MuWcxFElzT95b6qR5TLa9ENxa pM07aVY4zd4qDVVn1sjSrvOG/8Q2UEm+9WRFwhlieAUin8t0dwfWonhj9Oi3ZXXP FrEdG5ErxCsSwHlYdE7O07GulmkSd4ne7D2qHECzEMEfXRyGE6g= =MDlv -----END PGP SIGNATURE-----