Hacker Newsnew | past | comments | ask | show | jobs | submit | zshrc's commentslogin

MWM is included in modern Motif binary packages.


I think EMWM it's a better MWM. It even has options to make the menu sticky, a la Window Maker.

https://fastestcode.org/emwm.html

It's not CDE, but close. And some author wrote a tool to pin WindowMaker dockapps in a window, perfectly usable in a corner.

https://web.archive.org/web/20250105005119/https://luke8086....

I wouldn't mind using it on my n270 netbook, but a customized OpenBSD base's FVWM it's close enough to EMWM, minus the XFT fonts.


Wild because "Apple proprietary" is on GitHub and Orbstack is closed source but go off I guess.


You got me. It was super inaccurate to use "proprietary" here (though if i understand correctly, podman is another option that is FOSS).

License aside, though, I would still bet that relying on the Apple-specific version of something like this will cause headaches for teams unless you're operating in an environment that's all-in on Apple. Like, your CI tooling in the cloud runs on a Mac, that degree of vendor loyalty. I've never seen any shop like that.

Plus when this tooling does have interoperability bugs, I do not trust Apple to prioritize or even notice the needs of people like me, and they're the ones in charge of the releases.


It’s a shame because the TINIEST amount of web searching would’ve brought them DRM playback and video accelerated Firefox. It’s not a 1-to-1 experience like a ThinkPad running Linux but I think anyone using Linux as a daily pretty much knows there’s some things you gotta dig for.


I rely on this site HEAVILY at work. Makes figuring out package dependency hell a dream!


"Availability varies depending on region. To start, Maps on the web is available only in English. Maps on the web will be available for additional browsers, platforms, and languages soon."

Read the small text.


Not always, but they make it their goal to be.

Code standards are very strict in OpenBSD and security is always a primary thought...


Doesn’t affect RHEL7 or RHEL8.


Or RHEL9.

  $ rpm -q openssh
  openssh-8.7p1-38.0.1.el9.x86_64


Versions from 4.4p1 up to, but not including, 8.5p1 are not vulnerable.

The vulnerability resurfaces in versions from 8.5p1 up to, but not including, 9.8p1

https://blog.qualys.com/vulnerabilities-threat-research/2024...


> Statement

> The flaw affects RHEL9 as the regression was introduced after the OpenSSH version shipped with RHEL8 was published.


However, we see the -D option on the listening parent:

  $ ps ax | grep sshd | head -1
     1306 ?        Ss     0:01 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups
As mentioned elsewhere here, is -D sufficient to avoid exploitation, or is -e necessary as well?

  $ man sshd | sed -n '/ -[De]/,/^$/p'
     -D      When this option is specified, sshd will not
             detach and does not become a daemon.  This
             allows easy monitoring of sshd.

     -e      Write debug logs to standard error instead
             of the system log.
RHEL9 is also 64-bit only, and we see from the notice:

"we have started to work on an amd64 exploit, which is much harder because of the stronger ASLR."

On top of writing the exploit to target 32-bit environments, this also requires a DSA key that implements multiple calls to free().

There is a section on "Rocky Linux 9" near the end of the linked advisory where unsuccessful exploit attempts are discussed.


>As mentioned elsewhere here, is -D sufficient to avoid exploitation, or is -e necessary as well?

https://github.com/openssh/openssh-portable/blob/V_9_8_P1/ss...

sshd.c handles no_daemon (-D) and log_stderr (-e) independently. log_stderr is what is given to log_init in log.c that gates the call to syslog functions. There is a special case to set log_stderr to true if debug_flag (-d) is set, but nothing for no_daemon.

I can't test it right now though so I may be missing something.


I'm on Oracle Linux, and they appear to have already issued a patch for this problem:

  openssh-8.7p1-38.0.2.el9.x86_64.rpm
  openssh-server-8.7p1-38.0.2.el9.x86_64.rpm
  openssh-clients-8.7p1-38.0.2.el9.x86_64.rpm
The changelog addresses the CVE directly. It does not appear that adding the -e directive is necessary with this patch.

  $ rpm -q --changelog openssh-server | head -3
  * Wed Jun 26 2024 Alex Burmashev <[email protected]> - 8.7p1-38.0.2
  - Restore dropped earlier ifdef condition for safe _exit(1) call in sshsigdie() [Orabug: 36783468]
    Resolves CVE-2024-6387


So in other words, -De is not a workaround. -Dde might be but it will cause more log output than is wanted.


-De is a workaround. -D is not.


Speaking of Rocky 9, they suggest to get the new version from the SIG/Security repository:

https://rockylinux.org/news/2024-07-01-rocky-linux-9-cve-202...


Gives a nice overview of the changes to Virtualization framework. I wish Apple would’ve provided more technical videos like they did last year…


How the heck does the statement imply that?


The parent comment guesses they were avoiding saying Android, but, in analogy with imessage availability on both macos/ios, there's linux/android. But, yes, when I wrote "I think" i can't claim that's what they meant, just that's my reading of it.


Crazy that they’re still offering CentOS 7 images. PLEASE DONT USE THEM


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: