• OpenSSH Version 9.9-2 for VSI OpenVMS

    From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@arne@vajhoej.dk to comp.os.vms on Mon Sep 8 13:24:13 2025
    From Newsgroup: comp.os.vms

    For those that have not read the release notes - you should,
    because:

    <quote>
    OpenSSH Version 9.9-2 for VSI OpenVMS Release Notes and Installation Guide
    2.3. Known Problems and Restrictions
    ...
    ruA Using the SET TERMINAL/WIDTH=value command to resize your PuTTY
    terminal window
    (even as part of your LOGIN.COM) will cause the session to terminate.
    </quote>

    Arne

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Simon Clubley@clubley@remove_me.eisner.decus.org-Earth.UFP to comp.os.vms on Mon Sep 8 17:47:23 2025
    From Newsgroup: comp.os.vms

    On 2025-09-08, Arne Vajhoj <arne@vajhoej.dk> wrote:
    For those that have not read the release notes - you should,
    because:

    <quote>
    OpenSSH Version 9.9-2 for VSI OpenVMS Release Notes and Installation Guide 2.3. Known Problems and Restrictions
    ...
    ? Using the SET TERMINAL/WIDTH=value command to resize your PuTTY
    terminal window
    (even as part of your LOGIN.COM) will cause the session to terminate.
    </quote>


    JFC, how the hell is it considered acceptable to ship something which
    has a bug like _that_ in it ? :-( That should be a P1 blocker if discovered before release and should have resulted in the kit been pulled if
    discovered after release.

    Next question: _what_ causes the session to terminate and is it
    exploitable or (hopefully) just a session crasher ?

    Is it a supervisor or executive mode bugcheck or something which just
    causes a crash/bugcheck in the OpenSSH code ?

    Simon.
    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Craig A. Berry@craigberry@nospam.mac.com to comp.os.vms on Mon Sep 8 12:58:54 2025
    From Newsgroup: comp.os.vms

    On 9/8/25 12:47 PM, Simon Clubley wrote:
    On 2025-09-08, Arne Vajh|+j <arne@vajhoej.dk> wrote:
    For those that have not read the release notes - you should,
    because:

    <quote>
    OpenSSH Version 9.9-2 for VSI OpenVMS Release Notes and Installation Guide >> 2.3. Known Problems and Restrictions
    ...
    ? Using the SET TERMINAL/WIDTH=value command to resize your PuTTY
    terminal window
    (even as part of your LOGIN.COM) will cause the session to terminate.
    </quote>


    JFC, how the hell is it considered acceptable to ship something which
    has a bug like _that_ in it ? :-( That should be a P1 blocker if discovered before release and should have resulted in the kit been pulled if
    discovered after release.

    One of the fixes mentions a CVE related to X11 forwarding, so they may
    have felt they had to get it out there sooner rather than later even if
    it had known problems.


    Next question: _what_ causes the session to terminate and is it
    exploitable or (hopefully) just a session crasher ?

    Is it a supervisor or executive mode bugcheck or something which just
    causes a crash/bugcheck in the OpenSSH code ?

    Simon.


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Simon Clubley@clubley@remove_me.eisner.decus.org-Earth.UFP to comp.os.vms on Tue Sep 9 12:21:59 2025
    From Newsgroup: comp.os.vms

    On 2025-09-08, Craig A. Berry <craigberry@nospam.mac.com> wrote:
    On 9/8/25 12:47 PM, Simon Clubley wrote:
    On 2025-09-08, Arne Vajhoj <arne@vajhoej.dk> wrote:
    For those that have not read the release notes - you should,
    because:

    <quote>
    OpenSSH Version 9.9-2 for VSI OpenVMS Release Notes and Installation Guide >>> 2.3. Known Problems and Restrictions
    ...
    ? Using the SET TERMINAL/WIDTH=value command to resize your PuTTY
    terminal window
    (even as part of your LOGIN.COM) will cause the session to terminate.
    </quote>


    JFC, how the hell is it considered acceptable to ship something which
    has a bug like _that_ in it ? :-( That should be a P1 blocker if discovered >> before release and should have resulted in the kit been pulled if
    discovered after release.

    One of the fixes mentions a CVE related to X11 forwarding, so they may
    have felt they had to get it out there sooner rather than later even if
    it had known problems.


    Maybe. Let's just hope this crash is a benign crash.

    Simon.
    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@arne@vajhoej.dk to comp.os.vms on Tue Oct 14 15:13:24 2025
    From Newsgroup: comp.os.vms

    On 9/9/2025 8:21 AM, Simon Clubley wrote:
    On 2025-09-08, Craig A. Berry <craigberry@nospam.mac.com> wrote:
    On 9/8/25 12:47 PM, Simon Clubley wrote:
    On 2025-09-08, Arne Vajh|+j <arne@vajhoej.dk> wrote:
    For those that have not read the release notes - you should,
    because:

    <quote>
    OpenSSH Version 9.9-2 for VSI OpenVMS Release Notes and Installation Guide >>>> 2.3. Known Problems and Restrictions
    ...
    ? Using the SET TERMINAL/WIDTH=value command to resize your PuTTY
    terminal window
    (even as part of your LOGIN.COM) will cause the session to terminate.
    </quote>


    JFC, how the hell is it considered acceptable to ship something which
    has a bug like _that_ in it ? :-( That should be a P1 blocker if discovered >>> before release and should have resulted in the kit been pulled if
    discovered after release.

    One of the fixes mentions a CVE related to X11 forwarding, so they may
    have felt they had to get it out there sooner rather than later even if
    it had known problems.

    Maybe. Let's just hope this crash is a benign crash.

    9.9-2A with a fix was released over the weekend.

    Arne

    --- Synchronet 3.21a-Linux NewsLink 1.2