Thanks!
I don't see the artifacts for the 9.6p1 build. Do the project
maintainers need to cut a release?
-- R; <><
On 1/5/24 20:04, kekronbekron wrote:
You could grab the latest (unsupported) release from this repo, once it's
published.
Here's a link to the pull request, which introduces the latest version.
The build has succeeded.
https://github.com/ZOSOpenTools/opensshport/pull/6
On Saturday, January 6th, 2024 at 05:26, Filip Palian <[email protected]>
wrote:
For this type of verification SBOMs seems to be the way moving forward:
https://cyclonedx.org/use-cases/#known-vulnerabilities
Cheers,
FP
W dniu piątek, 5 stycznia 2024 rpinion865 <
[email protected]> napisał(a):
Does anyone know if the z/OS implementation of ssh is vulnerable to
CVE-2023048795? I tried searching
for z/OS and OpenSSH (CVE-2023-48795). But, I did not get any hits
specific to z/OS. Thanks in advance.
Cross posting to IBMTCP-L and IBM Main
Sent with Proton Mail secure email.
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN