PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).
Created putty tracking bugs for this issue:
Affects: epel-6 [bug 1852417]
Affects: epel-7 [bug 1852418]
Affects: fedora-all [bug 1852416]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.