Skip to content

Commit 45df779

Browse files
committed
fix wrong starting version
fixes wrong starting version of "CVE-2023-48795". as such, it is included the correct generated version starting from `ssh-5.0`
1 parent 412c8c2 commit 45df779

File tree

2 files changed

+58
-43
lines changed

2 files changed

+58
-43
lines changed

make/openvex.table

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -173,15 +173,6 @@
173173
"not_affected": "vulnerable_code_not_present"
174174
}
175175
},
176-
{
177-
"pkg:otp/ssh@5.1": "CVE-2023-48795",
178-
"status": {
179-
"affected": "Mitigation: If strict KEX availability cannot be ensured on both connection sides, affected encryption modes(CHACHA and CBC) can be disabled with standard ssh configuration. This will provide protection against vulnerability, but at a cost of affecting interoperability",
180-
"fixed": [
181-
"pkg:otp/ssh@5.1.1"
182-
]
183-
}
184-
},
185176
{
186177
"pkg:otp/ssh@5.0": "CVE-2025-26618",
187178
"status": {

vex/otp-26.openvex.json

Lines changed: 58 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
"@id": "https://openvex.dev/docs/public/otp/vex-otp-26",
44
"author": "vexctl",
55
"timestamp": "2025-08-28T16:31:28.818462+02:00",
6-
"last_updated": "2025-09-16T08:22:17.722696009Z",
7-
"version": 49,
6+
"last_updated": "2025-11-24T14:33:09.002873769+01:00",
7+
"version": 48,
88
"statements": [
99
{
1010
"vulnerability": {
@@ -2109,38 +2109,6 @@
21092109
"status": "not_affected",
21102110
"justification": "vulnerable_code_not_present"
21112111
},
2112-
{
2113-
"vulnerability": {
2114-
"name": "CVE-2023-48795"
2115-
},
2116-
"timestamp": "2025-08-28T16:31:55.433429189+02:00",
2117-
"products": [
2118-
{
2119-
"@id": "pkg:github/erlang/otp@OTP-26.2"
2120-
},
2121-
{
2122-
"@id": "pkg:otp/ssh@5.1"
2123-
}
2124-
],
2125-
"status": "affected",
2126-
"action_statement": "Mitigation: If strict KEX availability cannot be ensured on both connection sides, affected encryption modes(CHACHA and CBC) can be disabled with standard ssh configuration. This will provide protection against vulnerability, but at a cost of affecting interoperability",
2127-
"action_statement_timestamp": "2025-08-28T16:31:55.433429189+02:00"
2128-
},
2129-
{
2130-
"vulnerability": {
2131-
"name": "CVE-2023-48795"
2132-
},
2133-
"timestamp": "2025-08-28T16:31:55.449852183+02:00",
2134-
"products": [
2135-
{
2136-
"@id": "pkg:github/erlang/otp@OTP-26.2.1"
2137-
},
2138-
{
2139-
"@id": "pkg:otp/ssh@5.1.1"
2140-
}
2141-
],
2142-
"status": "fixed"
2143-
},
21442112
{
21452113
"vulnerability": {
21462114
"name": "CVE-2025-26618"
@@ -3611,6 +3579,62 @@
36113579
}
36123580
],
36133581
"status": "fixed"
3582+
},
3583+
{
3584+
"vulnerability": {
3585+
"name": "CVE-2023-48795"
3586+
},
3587+
"timestamp": "2025-11-24T14:33:08.98061651+01:00",
3588+
"products": [
3589+
{
3590+
"@id": "pkg:github/erlang/otp@OTP-26.0"
3591+
},
3592+
{
3593+
"@id": "pkg:github/erlang/otp@OTP-26.0.1"
3594+
},
3595+
{
3596+
"@id": "pkg:github/erlang/otp@OTP-26.0.2"
3597+
},
3598+
{
3599+
"@id": "pkg:github/erlang/otp@OTP-26.1"
3600+
},
3601+
{
3602+
"@id": "pkg:github/erlang/otp@OTP-26.1.1"
3603+
},
3604+
{
3605+
"@id": "pkg:github/erlang/otp@OTP-26.1.2"
3606+
},
3607+
{
3608+
"@id": "pkg:github/erlang/otp@OTP-26.2"
3609+
},
3610+
{
3611+
"@id": "pkg:otp/ssh@5.0"
3612+
},
3613+
{
3614+
"@id": "pkg:otp/ssh@5.0.1"
3615+
},
3616+
{
3617+
"@id": "pkg:otp/ssh@5.1"
3618+
}
3619+
],
3620+
"status": "affected",
3621+
"action_statement": "Update to any of the following versions: pkg:otp/ssh@5.1.1",
3622+
"action_statement_timestamp": "2025-11-24T14:33:08.98061651+01:00"
3623+
},
3624+
{
3625+
"vulnerability": {
3626+
"name": "CVE-2023-48795"
3627+
},
3628+
"timestamp": "2025-11-24T14:33:09.00287447+01:00",
3629+
"products": [
3630+
{
3631+
"@id": "pkg:github/erlang/otp@OTP-26.2.1"
3632+
},
3633+
{
3634+
"@id": "pkg:otp/ssh@5.1.1"
3635+
}
3636+
],
3637+
"status": "fixed"
36143638
}
36153639
]
36163640
}

0 commit comments

Comments
 (0)