CVE-2023-36861
NixOS vulnerability analysis and mitigation

Overview

An out-of-bounds write vulnerability (CVE-2023-36861) was discovered in GTKWave version 3.3.115, specifically affecting the VZT LZMA_read_varint functionality. The vulnerability was discovered by Claudio Bozzato of Cisco Talos and publicly disclosed on January 8, 2024. GTKWave, a wave viewer commonly used for analyzing FPGA simulations and logic analyzer captures, is affected across its Linux, Windows, and MacOS implementations (Talos Report).

Technical details

The vulnerability exists in the LZMA_read_varint function where a fixed-size buffer of 16 bytes is allocated on the stack. The function contains a loop that extracts one byte from the file and continues until it encounters a character with the MSB set to 1. Due to the absence of bounds checking, this loop can write beyond the buffer's limits, resulting in a stack buffer overflow. The issue affects both the vzt2vcd file conversion utility and the GUI portion of GTKWave. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (Talos Report).

Impact

If successfully exploited, this vulnerability can lead to arbitrary code execution on the target system. The vulnerability is particularly concerning as GTKWave automatically associates with supported file extensions, meaning that simply double-clicking a malicious wave file received via email could trigger the execution of malicious code (Talos Report).

Mitigation and workarounds

The vulnerability has been fixed in GTKWave version 3.3.118, which was released on December 31, 2023. Users are strongly advised to upgrade to this or later versions. The fix is available from the official GTKWave repository (Talos Report). Various Linux distributions have also released security updates to address this vulnerability, including Debian which has patched multiple versions (Debian LTS).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-69264CRITICAL9.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69263HIGH8.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69262HIGH7.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-20807MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2026-21885MEDIUM6.5
  • NixOSNixOS
  • miniflux
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management