Thanks!

I don't see the artifacts for the 9.6p1 build. Do the project maintainers need to cut a release?

-- R; <><


On 1/5/24 20:04, kekronbekron wrote:
You could grab the latest (unsupported) release from this repo, once it's 
published.
Here's a link to the pull request, which introduces the latest version.
The build has succeeded.

https://github.com/ZOSOpenTools/opensshport/pull/6



On Saturday, January 6th, 2024 at 05:26, Filip Palian <[email protected]> 
wrote:


For this type of verification SBOMs seems to be the way moving forward:
https://cyclonedx.org/use-cases/#known-vulnerabilities

Cheers,
FP

W dniu piątek, 5 stycznia 2024 rpinion865 <
[email protected]> napisał(a):

Does anyone know if the z/OS implementation of ssh is vulnerable to
CVE-2023048795? I tried searching
for z/OS and OpenSSH (CVE-2023-48795). But, I did not get any hits
specific to z/OS. Thanks in advance.

Cross posting to IBMTCP-L and IBM Main

Sent with Proton Mail secure email.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to