You could grab the latest (unsupported) release from this repo, once it's published. Here's a link to the pull request, which introduces the latest version. The build has succeeded.
https://github.com/ZOSOpenTools/opensshport/pull/6 On Saturday, January 6th, 2024 at 05:26, Filip Palian <s3...@pjwstk.edu.pl> wrote: > For this type of verification SBOMs seems to be the way moving forward: > https://cyclonedx.org/use-cases/#known-vulnerabilities > > Cheers, > FP > > W dniu piątek, 5 stycznia 2024 rpinion865 < > 0000042a019916dd-dmarc-requ...@listserv.ua.edu> napisał(a): > > > Does anyone know if the z/OS implementation of ssh is vulnerable to > > CVE-2023048795? I tried searching > > for z/OS and OpenSSH (CVE-2023-48795). But, I did not get any hits > > specific to z/OS. Thanks in advance. > > > > Cross posting to IBMTCP-L and IBM Main > > > > Sent with Proton Mail secure email. > > > > ---------------------------------------------------------------------- > > For IBM-MAIN subscribe / signoff / archive access instructions, > > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN