{"affected":[{"ecosystem_specific":{"binaries":[{"putty":"0.81-bp155.2.6.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP5","name":"putty","purl":"pkg:rpm/suse/putty&distro=SUSE%20Package%20Hub%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.81-bp155.2.6.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"putty":"0.81-bp155.2.6.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"putty","purl":"pkg:rpm/opensuse/putty&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.81-bp155.2.6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for putty fixes the following issues:\n\nUpdate to release 0.81\n\n* Fix CVE-2024-31497: NIST P521 / ecdsa-sha2-nistp521 signatures are no longer\n  generated with biased values of k. The previous bias compromises private keys.\n","id":"openSUSE-SU-2024:0111-1","modified":"2024-04-19T12:53:10Z","published":"2024-04-19T12:53:10Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YWBLPFDJD74NA6KYAQIVS5LANZFUCGL2/"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-31497"}],"related":["CVE-2024-31497"],"summary":"Security update for putty","upstream":["CVE-2024-31497"]}