![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.827970 |
Category: | Fedora Local Security Checks |
Title: | Fedora: Security Advisory for kitty (FEDORA-2023-3746647cc3) |
Summary: | The remote host is missing an update for the 'kitty'; package(s) announced via the FEDORA-2023-3746647cc3 advisory. |
Description: | Summary: The remote host is missing an update for the 'kitty' package(s) announced via the FEDORA-2023-3746647cc3 advisory. Vulnerability Insight: - Offloads rendering to the GPU for lower system load and buttery smooth scrolling. Uses threaded rendering to minimize input latency. - Supports all modern terminal features: graphics (images), unicode, true-color, OpenType ligatures, mouse protocol, focus tracking, bracketed paste and several new terminal protocol extensions. - Supports tiling multiple terminal windows side by side in different layouts without needing to use an extra program like tmux. - Can be controlled from scripts or the shell prompt, even over SSH. - Has a framework for Kittens, small terminal programs that can be used to extend kitty', s functionality. For example, they are used for Unicode input, Hints and Side-by-side diff. - Supports startup sessions which allow you to specify the window/tab layout, working directories and programs to run on startup. - Cross-platform: kitty works on Linux and macOS, but because it uses only OpenGL for rendering, it should be trivial to port to other Unix-like platforms. - Allows you to open the scrollback buffer in a separate window using arbitrary programs of your choice. This is useful for browsing the history comfortably in a pager or editor. - Has multiple copy/paste buffers, like vim. Affected Software/OS: 'kitty' package(s) on Fedora 37. Solution: Please install the updated package(s). CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-2383 http://lists.apple.com/archives/security-announce/2009/May/msg00002.html BugTraq ID: 33060 http://www.securityfocus.com/bid/33060 Cert/CC Advisory: TA09-133A http://www.us-cert.gov/cas/techalerts/TA09-133A.html Debian Security Information: DSA-1694 (Google Search) http://www.debian.org/security/2009/dsa-1694 https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00072.html https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00184.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3E2Q6NPKT7V4VKZMSFF4ARLRVYOG4AU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOOVZTIABA4MIFUGTAVYWO6QXSUXSST4/ https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9317 http://www.redhat.com/support/errata/RHSA-2009-0018.html http://www.redhat.com/support/errata/RHSA-2009-0019.html http://www.securitytracker.com/id?1021522 http://secunia.com/advisories/33318 http://secunia.com/advisories/33388 http://secunia.com/advisories/33397 http://secunia.com/advisories/33418 http://secunia.com/advisories/33419 http://secunia.com/advisories/33568 http://secunia.com/advisories/33820 http://secunia.com/advisories/35074 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254208-1 SuSE Security Announcement: SUSE-SR:2009:002 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html SuSE Security Announcement: SUSE-SR:2009:003 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html https://usn.ubuntu.com/703-1/ http://www.vupen.com/english/advisories/2009/1297 XForce ISS Database: xterm-decrqss-code-execution(47655) https://exchange.xforce.ibmcloud.com/vulnerabilities/47655 |
Copyright | Copyright (C) 2023 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |