[openSUSE-SU-2024:0005-1] Security update for putty
Severity
Important
Affected Packages
10
CVEs
1
Security update for putty
This update for putty fixes the following issues:
putty was updated to to release 0.80:
Fix CVE-2023-48795 [boo#1218128]
Update to release 0.79
- Terminal mouse tracking: support for mouse movements which are not drags, and support for horizontal scroll events (e.g. generated by trackpads).
- Fixed: PuTTY could fail an assertion if a resize control sequence was sent by the server while the window was docked to one half of the screen in KDE.
- Fixed: PuTTY could fail an assertion if you tried to change the font size while the window was maximised.
Update to release 0.78
- Support for OpenSSH certificates, for both user authentication keys and host keys.
- New SSH proxy modes, for running a custom shell command or subsystem on the proxy server instead of forwarding a port through it.
- New plugin system to allow a helper program to provide responses in keyboard-interactive authentication, intended to automate one-time password systems.
- Support for NTRU Prime post-quantum key exchange,
- Support for AES-GCM (in the OpenSSH style rather than RFC 5647).
- Support for more forms of Diffie-Hellman key exchange: new larger integer groups (such as group16 and group18), and support for using those and ECDH with GSSAPI.
- Bug fix: server-controlled window title setting now works again even if the character set is ISO 8859 (or a few other
Package | Affected Version |
---|---|
pkg:rpm/opensuse/putty?arch=x86_64&distro=opensuse-leap-15.4 | < 0.80-bp154.2.3.1 |
pkg:rpm/opensuse/putty?arch=x86_64&distro=opensuse-15&repo=suse-package-hub | < 0.80-bp154.2.3.1 |
pkg:rpm/opensuse/putty?arch=s390x&distro=opensuse-leap-15.4 | < 0.80-bp154.2.3.1 |
pkg:rpm/opensuse/putty?arch=s390x&distro=opensuse-15&repo=suse-package-hub | < 0.80-bp154.2.3.1 |
pkg:rpm/opensuse/putty?arch=ppc64le&distro=opensuse-leap-15.4 | < 0.80-bp154.2.3.1 |
pkg:rpm/opensuse/putty?arch=ppc64le&distro=opensuse-15&repo=suse-package-hub | < 0.80-bp154.2.3.1 |
pkg:rpm/opensuse/putty?arch=i586&distro=opensuse-leap-15.4 | < 0.80-bp154.2.3.1 |
pkg:rpm/opensuse/putty?arch=i586&distro=opensuse-15&repo=suse-package-hub | < 0.80-bp154.2.3.1 |
pkg:rpm/opensuse/putty?arch=aarch64&distro=opensuse-leap-15.4 | < 0.80-bp154.2.3.1 |
pkg:rpm/opensuse/putty?arch=aarch64&distro=opensuse-15&repo=suse-package-hub | < 0.80-bp154.2.3.1 |
- ID
- openSUSE-SU-2024:0005-1
- Severity
- important
- URL
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVOEVD2B4CFVDJEJANZW6QGRI6FTWFJ3/
- Published
-
2024-01-03T11:04:00
(8 months ago) - Modified
-
2024-01-03T11:04:00
(8 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1898
- ALAS2-2023-2376
- ALPINE:CVE-2023-48795
- ALSA-2024:0606
- ALSA-2024:0628
- ALSA-2024:1130
- ALSA-2024:1150
- DSA-5586-1
- DSA-5588-1
- DSA-5591-1
- DSA-5599-1
- DSA-5600-1
- DSA-5601-1
- DSA-5750-1
- ELSA-2024-0606
- ELSA-2024-0628
- ELSA-2024-1130
- ELSA-2024-1150
- ELSA-2024-12157
- ELSA-2024-12158
- ELSA-2024-12164
- ELSA-2024-12232
- ELSA-2024-12233
- ELSA-2024-2988
- FEDORA-2023-0733306be9
- FEDORA-2023-153404713b
- FEDORA-2023-20feb865d8
- FEDORA-2023-55800423a8
- FEDORA-2023-b87ec6cf47
- FEDORA-2023-cb8c606fbb
- FEDORA-2023-e77300e4b5
- FEDORA-2024-06ebb70bdd
- FEDORA-2024-2705241461
- FEDORA-2024-37627e432e
- FEDORA-2024-39a8c72ea9
- FEDORA-2024-3bb23c77f3
- FEDORA-2024-3fd1bc9276
- FEDORA-2024-71c2c6526c
- FEDORA-2024-7b08207cdb
- FEDORA-2024-7e301327c2
- FEDORA-2024-a53b24023d
- FEDORA-2024-ae653fb07b
- FEDORA-2024-d946b9ad25
- FEDORA-2024-fb32950d11
- FREEBSD:0F7598CC-9FE2-11EE-B47F-901B0E9408DC
- FREEBSD:13D83980-9F18-11EE-8E38-002590C1F29C
- FREEBSD:4EBDD56B-FE72-11EE-BC57-00E081B7AA2D
- FREEBSD:91955195-9EBB-11EE-BC14-A703705DB3A6
- FREEBSD:B5E22EC5-BC4B-11EE-B0B5-B42E991FC52E
- GLSA-202312-16
- GLSA-202312-17
- GLSA-202407-11
- GLSA-202407-12
- GO-2023-2402
- JENKINS:SECURITY-3333
- JENKINS:SECURITY-3386
- openSUSE-SU-2023:0411-1
- openSUSE-SU-2023:0421-1
- openSUSE-SU-2024:0008-1
- openSUSE-SU-2024:0036-1
- RHBA-2024:1127
- RHBA-2024:1136
- RHSA-2024:0606
- RHSA-2024:0628
- RHSA-2024:1130
- RHSA-2024:1150
- RHSA-2024:2988
- RLSA-2024:0606
- RLSA-2024:0628
- SSA:2023-353-01
- SSA:2023-354-01
- SUSE-SU-2023:4902-1
- SUSE-SU-2023:4903-1
- SUSE-SU-2023:4904-1
- SUSE-SU-2023:4905-1
- SUSE-SU-2023:4946-1
- SUSE-SU-2024:0006-1
- SUSE-SU-2024:0035-1
- SUSE-SU-2024:0140-1
- SUSE-SU-2024:0210-1
- SUSE-SU-2024:0224-1
- SUSE-SU-2024:0327-1
- SUSE-SU-2024:0430-1
- SUSE-SU-2024:0460-1
- SUSE-SU-2024:0525-1
- SUSE-SU-2024:0539-1
- SUSE-SU-2024:0543-1
- SUSE-SU-2024:0558-1
- SUSE-SU-2024:0972-1
- SUSE-SU-2024:0974-1
- USN-6560-1
- USN-6560-2
- USN-6561-1
- USN-6585-1
- USN-6589-1
- USN-6598-1
- USN-6738-1
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0005-1.json | |
Suse | URL for openSUSE-SU-2024:0005-1 | https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVOEVD2B4CFVDJEJANZW6QGRI6FTWFJ3/ | |
Suse | E-Mail link for openSUSE-SU-2024:0005-1 | https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVOEVD2B4CFVDJEJANZW6QGRI6FTWFJ3/ | |
Bugzilla | SUSE Bug 1218128 | https://bugzilla.suse.com/1218128 | |
CVE | SUSE CVE CVE-2023-48795 page | https://www.suse.com/security/cve/CVE-2023-48795/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/opensuse/putty?arch=x86_64&distro=opensuse-leap-15.4 | opensuse | putty | < 0.80-bp154.2.3.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/opensuse/putty?arch=x86_64&distro=opensuse-15&repo=suse-package-hub | opensuse | putty | < 0.80-bp154.2.3.1 | opensuse-15 | x86_64 | |
Affected | pkg:rpm/opensuse/putty?arch=s390x&distro=opensuse-leap-15.4 | opensuse | putty | < 0.80-bp154.2.3.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/opensuse/putty?arch=s390x&distro=opensuse-15&repo=suse-package-hub | opensuse | putty | < 0.80-bp154.2.3.1 | opensuse-15 | s390x | |
Affected | pkg:rpm/opensuse/putty?arch=ppc64le&distro=opensuse-leap-15.4 | opensuse | putty | < 0.80-bp154.2.3.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/opensuse/putty?arch=ppc64le&distro=opensuse-15&repo=suse-package-hub | opensuse | putty | < 0.80-bp154.2.3.1 | opensuse-15 | ppc64le | |
Affected | pkg:rpm/opensuse/putty?arch=i586&distro=opensuse-leap-15.4 | opensuse | putty | < 0.80-bp154.2.3.1 | opensuse-leap-15.4 | i586 | |
Affected | pkg:rpm/opensuse/putty?arch=i586&distro=opensuse-15&repo=suse-package-hub | opensuse | putty | < 0.80-bp154.2.3.1 | opensuse-15 | i586 | |
Affected | pkg:rpm/opensuse/putty?arch=aarch64&distro=opensuse-leap-15.4 | opensuse | putty | < 0.80-bp154.2.3.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/opensuse/putty?arch=aarch64&distro=opensuse-15&repo=suse-package-hub | opensuse | putty | < 0.80-bp154.2.3.1 | opensuse-15 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |