You could grab the latest (unsupported) release from this repo, once it's 
published.
Here's a link to the pull request, which introduces the latest version.
The build has succeeded.

https://github.com/ZOSOpenTools/opensshport/pull/6



On Saturday, January 6th, 2024 at 05:26, Filip Palian <s3...@pjwstk.edu.pl> 
wrote:


> For this type of verification SBOMs seems to be the way moving forward:
> https://cyclonedx.org/use-cases/#known-vulnerabilities
> 
> Cheers,
> FP
> 
> W dniu piątek, 5 stycznia 2024 rpinion865 <
> 0000042a019916dd-dmarc-requ...@listserv.ua.edu> napisał(a):
> 
> > Does anyone know if the z/OS implementation of ssh is vulnerable to
> > CVE-2023048795? I tried searching
> > for z/OS and OpenSSH (CVE-2023-48795). But, I did not get any hits
> > specific to z/OS. Thanks in advance.
> > 
> > Cross posting to IBMTCP-L and IBM Main
> > 
> > Sent with Proton Mail secure email.
> > 
> > ----------------------------------------------------------------------
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to