Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
50 changes: 17 additions & 33 deletions make/openvex.table
Original file line number Diff line number Diff line change
@@ -1,5 +1,14 @@
{
"otp-26": [
{
"pkg:otp/[email protected]": "CVE-2023-48795",
"status": {
"affected": "Update to any of the following versions: pkg:otp/[email protected]",
"fixed": [
"pkg:otp/[email protected]"
]
}
},
{
"pkg:otp/[email protected]": "CVE-2025-48041",
"status": {
Expand Down Expand Up @@ -164,15 +173,6 @@
"not_affected": "vulnerable_code_not_present"
}
},
{
"pkg:otp/[email protected]": "CVE-2023-48795",
"status": {
"affected": "Mitigation: If strict KEX availability cannot be ensured on both connection sides, affected encryption modes(CHACHA and CBC) can be disabled with standard ssh configuration. This will provide protection against vulnerability, but at a cost of affecting interoperability",
"fixed": [
"pkg:otp/[email protected]"
]
}
},
Comment on lines -167 to -175
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the starting version I wrote for this table was not correct.

the script was able to detect that we were missing the correct version, ssh-5.0, but could not re-generate the correct versions by itself for the otp-26.openvex.json file.

This is a special case, simply because the script generates the correct versions assuming it starts from 0.
In cases where we manually write wrongly the versions, we have to simply remove the CVE and run .github/scripts/otp-compliance.es vex run -b otp-26 to generate the correct versions.

This is what my commit shows.

{
"pkg:otp/[email protected]": "CVE-2025-26618",
"status": {
Expand Down Expand Up @@ -560,21 +560,15 @@
},
{
"pkg:github/openssl/openssl@636dfadc70ce26f2473870570bfd9ec352806b1d": "CVE-2025-9230",
"status": {
"not_affected": "vulnerable_code_not_present"
}
"status": { "not_affected": "vulnerable_code_not_present" }
},
{
"pkg:github/openssl/openssl@636dfadc70ce26f2473870570bfd9ec352806b1d": "CVE-2025-9231",
"status": {
"not_affected": "vulnerable_code_not_present"
}
"status": { "not_affected": "vulnerable_code_not_present" }
},
{
"pkg:github/openssl/openssl@636dfadc70ce26f2473870570bfd9ec352806b1d": "CVE-2025-9232",
"status": {
"not_affected": "vulnerable_code_not_present"
}
"status": { "not_affected": "vulnerable_code_not_present" }
}
],
"otp-29": [
Expand All @@ -584,33 +578,23 @@
},
{
"pkg:github/openssl/openssl@01d5e2318405362b4de5e670c90d9b40a351d053": "CVE-2025-4575",
"status": {
"not_affected": "vulnerable_code_not_present"
}
"status": { "not_affected": "vulnerable_code_not_present" }
},
{
"pkg:github/openssl/openssl@636dfadc70ce26f2473870570bfd9ec352806b1d": "CVE-2016-2183",
"status": {
"not_affected": "vulnerable_code_not_present"
}
"status": { "not_affected": "vulnerable_code_not_present" }
},
{
"pkg:github/openssl/openssl@636dfadc70ce26f2473870570bfd9ec352806b1d": "CVE-2025-9230",
"status": {
"not_affected": "vulnerable_code_not_present"
}
"status": { "not_affected": "vulnerable_code_not_present" }
},
{
"pkg:github/openssl/openssl@636dfadc70ce26f2473870570bfd9ec352806b1d": "CVE-2025-9231",
"status": {
"not_affected": "vulnerable_code_not_present"
}
"status": { "not_affected": "vulnerable_code_not_present" }
},
{
"pkg:github/openssl/openssl@636dfadc70ce26f2473870570bfd9ec352806b1d": "CVE-2025-9232",
"status": {
"not_affected": "vulnerable_code_not_present"
}
"status": { "not_affected": "vulnerable_code_not_present" }
}
]
}
92 changes: 58 additions & 34 deletions vex/otp-26.openvex.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,8 @@
"@id": "https://openvex.dev/docs/public/otp/vex-otp-26",
"author": "vexctl",
"timestamp": "2025-08-28T16:31:28.818462+02:00",
"last_updated": "2025-09-16T08:22:17.722696009Z",
"version": 49,
"last_updated": "2025-11-24T14:33:09.002873769+01:00",
"version": 48,
"statements": [
{
"vulnerability": {
Expand Down Expand Up @@ -2109,38 +2109,6 @@
"status": "not_affected",
"justification": "vulnerable_code_not_present"
},
{
"vulnerability": {
"name": "CVE-2023-48795"
},
"timestamp": "2025-08-28T16:31:55.433429189+02:00",
"products": [
{
"@id": "pkg:github/erlang/[email protected]"
},
{
"@id": "pkg:otp/[email protected]"
}
],
"status": "affected",
"action_statement": "Mitigation: If strict KEX availability cannot be ensured on both connection sides, affected encryption modes(CHACHA and CBC) can be disabled with standard ssh configuration. This will provide protection against vulnerability, but at a cost of affecting interoperability",
"action_statement_timestamp": "2025-08-28T16:31:55.433429189+02:00"
},
{
"vulnerability": {
"name": "CVE-2023-48795"
},
"timestamp": "2025-08-28T16:31:55.449852183+02:00",
"products": [
{
"@id": "pkg:github/erlang/[email protected]"
},
{
"@id": "pkg:otp/[email protected]"
}
],
"status": "fixed"
},
{
"vulnerability": {
"name": "CVE-2025-26618"
Expand Down Expand Up @@ -3611,6 +3579,62 @@
}
],
"status": "fixed"
},
{
"vulnerability": {
"name": "CVE-2023-48795"
},
"timestamp": "2025-11-24T14:33:08.98061651+01:00",
"products": [
{
"@id": "pkg:github/erlang/[email protected]"
},
{
"@id": "pkg:github/erlang/[email protected]"
},
{
"@id": "pkg:github/erlang/[email protected]"
},
{
"@id": "pkg:github/erlang/[email protected]"
},
{
"@id": "pkg:github/erlang/[email protected]"
},
{
"@id": "pkg:github/erlang/[email protected]"
},
{
"@id": "pkg:github/erlang/[email protected]"
},
{
"@id": "pkg:otp/[email protected]"
},
{
"@id": "pkg:otp/[email protected]"
},
{
"@id": "pkg:otp/[email protected]"
}
],
"status": "affected",
"action_statement": "Update to any of the following versions: pkg:otp/[email protected]",
"action_statement_timestamp": "2025-11-24T14:33:08.98061651+01:00"
},
{
"vulnerability": {
"name": "CVE-2023-48795"
},
"timestamp": "2025-11-24T14:33:09.00287447+01:00",
"products": [
{
"@id": "pkg:github/erlang/[email protected]"
},
{
"@id": "pkg:otp/[email protected]"
}
],
"status": "fixed"
}
]
}
Loading