Your message dated Thu, 04 Apr 2024 22:47:08 +0000
with message-id <e1rsvrq-00bx14...@fasolo.debian.org>
and subject line Bug#1060407: fixed in gtkwave 3.3.118-0.1~deb12u1
has caused the Debian Bug report #1060407,
regarding Multiple security issues
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1060407: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060407
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gtkwave
Version: 3.3.116-1
Severity: grave
Tags: security
X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>

A very thorough security audit of gtkwave unveiled a total of 82 security
issues in gtkwave, all fixed in 3.3.118:

CVE-2023-32650 CVE-2023-34087 CVE-2023-34436 CVE-2023-35004
CVE-2023-35057 CVE-2023-35128 CVE-2023-35702 CVE-2023-35703
CVE-2023-35704 CVE-2023-35955 CVE-2023-35956 CVE-2023-35957
CVE-2023-35958 CVE-2023-35959 CVE-2023-35960 CVE-2023-35961
CVE-2023-35962 CVE-2023-35963 CVE-2023-35964 CVE-2023-35969
CVE-2023-35970 CVE-2023-35989 CVE-2023-35992 CVE-2023-35994
CVE-2023-35995 CVE-2023-35996 CVE-2023-35997 CVE-2023-36746
CVE-2023-36747 CVE-2023-36861 CVE-2023-36864 CVE-2023-36915
CVE-2023-36916 CVE-2023-37282 CVE-2023-37416 CVE-2023-37417
CVE-2023-37418 CVE-2023-37419 CVE-2023-37420 CVE-2023-37442
CVE-2023-37443 CVE-2023-37444 CVE-2023-37445 CVE-2023-37446
CVE-2023-37447 CVE-2023-37573 CVE-2023-37574 CVE-2023-37575
CVE-2023-37576 CVE-2023-37577 CVE-2023-37578 CVE-2023-37921
CVE-2023-37922 CVE-2023-37923 CVE-2023-38583 CVE-2023-38618
CVE-2023-38619 CVE-2023-38620 CVE-2023-38621 CVE-2023-38622
CVE-2023-38623 CVE-2023-38648 CVE-2023-38649 CVE-2023-38650
CVE-2023-38651 CVE-2023-38652 CVE-2023-38653 CVE-2023-38657
CVE-2023-39234 CVE-2023-39235 CVE-2023-39270 CVE-2023-39271
CVE-2023-39272 CVE-2023-39273 CVE-2023-39274 CVE-2023-39275
CVE-2023-39316 CVE-2023-39317 CVE-2023-39413 CVE-2023-39414
CVE-2023-39443 CVE-2023-39444

Let's first fix unstable and then we can simple build 3.3.118
for stable-security and oldstable-security as well.

Full details in these advisories from TALOS:
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1777
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1790
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1792
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1793
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1797
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1798
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1803
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1807
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1810
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1811
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1813
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1815
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1816
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1817
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1819
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1820
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1822
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1823
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1824
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1827

Cheers,
        Moritz

--- End Message ---
--- Begin Message ---
Source: gtkwave
Source-Version: 3.3.118-0.1~deb12u1
Done: Adrian Bunk <b...@debian.org>

We believe that the bug you reported is fixed in the latest version of
gtkwave, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1060...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adrian Bunk <b...@debian.org> (supplier of updated gtkwave package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 28 Mar 2024 08:53:47 +0200
Source: gtkwave
Architecture: source
Version: 3.3.118-0.1~deb12u1
Distribution: bookworm-security
Urgency: high
Maintainer: Debian Electronics Team 
<pkg-electronics-de...@alioth-lists.debian.net>
Changed-By: Adrian Bunk <b...@debian.org>
Closes: 1060407
Changes:
 gtkwave (3.3.118-0.1~deb12u1) bookworm-security; urgency=medium
 .
   * Non-maintainer upload.
   * Rebuild for bookworm-security.
 .
 gtkwave (3.3.118-0.1) unstable; urgency=high
 .
   * Non-maintainer upload.
   * New upstream release.
     - Fixes multiple vulnerabilities:
       CVE-2023-32650, CVE-2023-34087, CVE-2023-34436, CVE-2023-35004,
       CVE-2023-35057, CVE-2023-35128, CVE-2023-35702, CVE-2023-35703,
       CVE-2023-35704, CVE-2023-35955, CVE-2023-35956, CVE-2023-35957,
       CVE-2023-35958, CVE-2023-35959, CVE-2023-35960, CVE-2023-35961,
       CVE-2023-35962, CVE-2023-35963, CVE-2023-35964, CVE-2023-35969,
       CVE-2023-35970, CVE-2023-35989, CVE-2023-35992, CVE-2023-35994,
       CVE-2023-35995, CVE-2023-35996, CVE-2023-35997, CVE-2023-36746,
       CVE-2023-36747, CVE-2023-36861, CVE-2023-36864, CVE-2023-36915,
       CVE-2023-36916, CVE-2023-37282, CVE-2023-37416, CVE-2023-37417,
       CVE-2023-37418, CVE-2023-37419, CVE-2023-37420, CVE-2023-37442,
       CVE-2023-37443, CVE-2023-37444, CVE-2023-37445, CVE-2023-37446,
       CVE-2023-37447, CVE-2023-37573, CVE-2023-37574, CVE-2023-37575,
       CVE-2023-37576, CVE-2023-37577, CVE-2023-37578, CVE-2023-37921,
       CVE-2023-37922, CVE-2023-37923, CVE-2023-38583, CVE-2023-38618,
       CVE-2023-38619, CVE-2023-38620, CVE-2023-38621, CVE-2023-38622,
       CVE-2023-38623, CVE-2023-38648, CVE-2023-38649, CVE-2023-38650,
       CVE-2023-38651, CVE-2023-38652, CVE-2023-38653, CVE-2023-38657,
       CVE-2023-39234, CVE-2023-39235, CVE-2023-39270, CVE-2023-39271,
       CVE-2023-39272, CVE-2023-39273, CVE-2023-39274, CVE-2023-39275,
       CVE-2023-39316, CVE-2023-39317, CVE-2023-39413, CVE-2023-39414,
       CVE-2023-39443, CVE-2023-39444
       (Closes: #1060407)
Checksums-Sha1:
 6f1bbcde6af1b8b3cdc16510d25b5aec1d75d29b 2148 gtkwave_3.3.118-0.1~deb12u1.dsc
 b09261fab198fdd29a67011a55f5d8901a9cb2d7 3330206 gtkwave_3.3.118.orig.tar.gz
 b9fb37b4dac422b8ca0c54534a0b8fdf476d85a1 9220 
gtkwave_3.3.118-0.1~deb12u1.debian.tar.xz
Checksums-Sha256:
 668c273e24a0b4a2fdd0a7f51aa9a1088a1af5259e655981f6e53f598f073bd6 2148 
gtkwave_3.3.118-0.1~deb12u1.dsc
 0f4330c028a2ab3d2f4d4ceeaf6db6925db010c4b6fd52d11022d0e5dea0486a 3330206 
gtkwave_3.3.118.orig.tar.gz
 04c8f1ffcf3a4c18e0c4b6a863c3c2066629ce90afdf749aec4366f881ff3e88 9220 
gtkwave_3.3.118-0.1~deb12u1.debian.tar.xz
Files:
 39e0b7a184eb940924ec2436d8b21ad1 2148 electronics optional 
gtkwave_3.3.118-0.1~deb12u1.dsc
 3a1281bce5fd56e43585773ab07bfd2b 3330206 electronics optional 
gtkwave_3.3.118.orig.tar.gz
 18986e3f9d85fccfcec16e2729e2bf44 9220 electronics optional 
gtkwave_3.3.118-0.1~deb12u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=OBBD
-----END PGP SIGNATURE-----

Attachment: pgp9kY7qUPmgb.pgp
Description: PGP signature


--- End Message ---

Reply via email to