|
3 | 3 | "@id": "https://openvex.dev/docs/public/otp/vex-otp-26", |
4 | 4 | "author": "vexctl", |
5 | 5 | "timestamp": "2025-08-28T16:31:28.818462+02:00", |
6 | | - "last_updated": "2025-09-16T08:22:17.722696009Z", |
7 | | - "version": 49, |
| 6 | + "last_updated": "2025-11-24T14:33:09.002873769+01:00", |
| 7 | + "version": 48, |
8 | 8 | "statements": [ |
9 | 9 | { |
10 | 10 | "vulnerability": { |
|
2109 | 2109 | "status": "not_affected", |
2110 | 2110 | "justification": "vulnerable_code_not_present" |
2111 | 2111 | }, |
2112 | | - { |
2113 | | - "vulnerability": { |
2114 | | - "name": "CVE-2023-48795" |
2115 | | - }, |
2116 | | - "timestamp": "2025-08-28T16:31:55.433429189+02:00", |
2117 | | - "products": [ |
2118 | | - { |
2119 | | - "@id": "pkg:github/erlang/otp@OTP-26.2" |
2120 | | - }, |
2121 | | - { |
2122 | | - "@id": "pkg:otp/ssh@5.1" |
2123 | | - } |
2124 | | - ], |
2125 | | - "status": "affected", |
2126 | | - "action_statement": "Mitigation: If strict KEX availability cannot be ensured on both connection sides, affected encryption modes(CHACHA and CBC) can be disabled with standard ssh configuration. This will provide protection against vulnerability, but at a cost of affecting interoperability", |
2127 | | - "action_statement_timestamp": "2025-08-28T16:31:55.433429189+02:00" |
2128 | | - }, |
2129 | | - { |
2130 | | - "vulnerability": { |
2131 | | - "name": "CVE-2023-48795" |
2132 | | - }, |
2133 | | - "timestamp": "2025-08-28T16:31:55.449852183+02:00", |
2134 | | - "products": [ |
2135 | | - { |
2136 | | - "@id": "pkg:github/erlang/otp@OTP-26.2.1" |
2137 | | - }, |
2138 | | - { |
2139 | | - "@id": "pkg:otp/ssh@5.1.1" |
2140 | | - } |
2141 | | - ], |
2142 | | - "status": "fixed" |
2143 | | - }, |
2144 | 2112 | { |
2145 | 2113 | "vulnerability": { |
2146 | 2114 | "name": "CVE-2025-26618" |
|
3611 | 3579 | } |
3612 | 3580 | ], |
3613 | 3581 | "status": "fixed" |
| 3582 | + }, |
| 3583 | + { |
| 3584 | + "vulnerability": { |
| 3585 | + "name": "CVE-2023-48795" |
| 3586 | + }, |
| 3587 | + "timestamp": "2025-11-24T14:33:08.98061651+01:00", |
| 3588 | + "products": [ |
| 3589 | + { |
| 3590 | + "@id": "pkg:github/erlang/otp@OTP-26.0" |
| 3591 | + }, |
| 3592 | + { |
| 3593 | + "@id": "pkg:github/erlang/otp@OTP-26.0.1" |
| 3594 | + }, |
| 3595 | + { |
| 3596 | + "@id": "pkg:github/erlang/otp@OTP-26.0.2" |
| 3597 | + }, |
| 3598 | + { |
| 3599 | + "@id": "pkg:github/erlang/otp@OTP-26.1" |
| 3600 | + }, |
| 3601 | + { |
| 3602 | + "@id": "pkg:github/erlang/otp@OTP-26.1.1" |
| 3603 | + }, |
| 3604 | + { |
| 3605 | + "@id": "pkg:github/erlang/otp@OTP-26.1.2" |
| 3606 | + }, |
| 3607 | + { |
| 3608 | + "@id": "pkg:github/erlang/otp@OTP-26.2" |
| 3609 | + }, |
| 3610 | + { |
| 3611 | + "@id": "pkg:otp/ssh@5.0" |
| 3612 | + }, |
| 3613 | + { |
| 3614 | + "@id": "pkg:otp/ssh@5.0.1" |
| 3615 | + }, |
| 3616 | + { |
| 3617 | + "@id": "pkg:otp/ssh@5.1" |
| 3618 | + } |
| 3619 | + ], |
| 3620 | + "status": "affected", |
| 3621 | + "action_statement": "Update to any of the following versions: pkg:otp/ssh@5.1.1", |
| 3622 | + "action_statement_timestamp": "2025-11-24T14:33:08.98061651+01:00" |
| 3623 | + }, |
| 3624 | + { |
| 3625 | + "vulnerability": { |
| 3626 | + "name": "CVE-2023-48795" |
| 3627 | + }, |
| 3628 | + "timestamp": "2025-11-24T14:33:09.00287447+01:00", |
| 3629 | + "products": [ |
| 3630 | + { |
| 3631 | + "@id": "pkg:github/erlang/otp@OTP-26.2.1" |
| 3632 | + }, |
| 3633 | + { |
| 3634 | + "@id": "pkg:otp/ssh@5.1.1" |
| 3635 | + } |
| 3636 | + ], |
| 3637 | + "status": "fixed" |
3614 | 3638 | } |
3615 | 3639 | ] |
3616 | 3640 | } |
0 commit comments