Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.827970
Category:Fedora Local Security Checks
Title:Fedora: Security Advisory for kitty (FEDORA-2023-3746647cc3)
Summary:The remote host is missing an update for the 'kitty'; package(s) announced via the FEDORA-2023-3746647cc3 advisory.
Description:Summary:
The remote host is missing an update for the 'kitty'
package(s) announced via the FEDORA-2023-3746647cc3 advisory.

Vulnerability Insight:
- Offloads rendering to the GPU for lower system load and buttery smooth
scrolling. Uses threaded rendering to minimize input latency.

- Supports all modern terminal features: graphics (images), unicode, true-color,
OpenType ligatures, mouse protocol, focus tracking, bracketed paste and
several new terminal protocol extensions.

- Supports tiling multiple terminal windows side by side in different layouts
without needing to use an extra program like tmux.

- Can be controlled from scripts or the shell prompt, even over SSH.

- Has a framework for Kittens, small terminal programs that can be used to
extend kitty', s functionality. For example, they are used for Unicode input,
Hints and Side-by-side diff.

- Supports startup sessions which allow you to specify the window/tab layout,
working directories and programs to run on startup.

- Cross-platform: kitty works on Linux and macOS, but because it uses only
OpenGL for rendering, it should be trivial to port to other Unix-like
platforms.

- Allows you to open the scrollback buffer in a separate window using arbitrary
programs of your choice. This is useful for browsing the history comfortably
in a pager or editor.

- Has multiple copy/paste buffers, like vim.

Affected Software/OS:
'kitty' package(s) on Fedora 37.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-2383
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
BugTraq ID: 33060
http://www.securityfocus.com/bid/33060
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Debian Security Information: DSA-1694 (Google Search)
http://www.debian.org/security/2009/dsa-1694
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00072.html
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00184.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3E2Q6NPKT7V4VKZMSFF4ARLRVYOG4AU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOOVZTIABA4MIFUGTAVYWO6QXSUXSST4/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9317
http://www.redhat.com/support/errata/RHSA-2009-0018.html
http://www.redhat.com/support/errata/RHSA-2009-0019.html
http://www.securitytracker.com/id?1021522
http://secunia.com/advisories/33318
http://secunia.com/advisories/33388
http://secunia.com/advisories/33397
http://secunia.com/advisories/33418
http://secunia.com/advisories/33419
http://secunia.com/advisories/33568
http://secunia.com/advisories/33820
http://secunia.com/advisories/35074
http://sunsolve.sun.com/search/document.do?assetkey=1-66-254208-1
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
SuSE Security Announcement: SUSE-SR:2009:003 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
https://usn.ubuntu.com/703-1/
http://www.vupen.com/english/advisories/2009/1297
XForce ISS Database: xterm-decrqss-code-execution(47655)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47655
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.