yottanami_ 2017-01-24 00:48:13
How should I load .Xdefaults ?
crashev 2017-01-24 00:49:26
hello, any idea when this https://security-tracker.debian.org/tracker/CVE-2016-10012 and https://security-tracker.debian.org/tracker/CVE-2016-10009 will be fixed for Jessie ?
petn-randall 2017-01-24 00:53:24
jomofcw: That's what your mtr output suggests, yes.
hmuller 2017-01-24 00:58:50
yottanami_: (short) xrdb can load .Xdefaults (long) I think current practice is to use .Xresources and .Xresources.d/, if an app is still looking for .Xdefaults, maybe create a symlink from .Xdefaults to .Xresources
jomofcw 2017-01-24 00:59:23
petn-randall OK, thanks. I send him an email. Thanks for your help, thanks ChrisH too.
MarcoNL 2017-01-24 01:11:45
interfac
MarcoNL 2017-01-24 01:12:00
sorry.. wrong channel
MarcoNL 2017-01-24 01:12:55
anywayzz.. could anyone help me out with this: http://unix.stackexchange.com/q/339730/212096 it's a problem I have with preseeding a debian installation with raid 1 and lvm
petn-randall 2017-01-24 01:15:45
MarcoNL: I guess you'll get a response on SE soon.
petn-randall 2017-01-24 01:15:52
!tell MarcoNL -about crosspost
temp-wifirepeate 2017-01-24 01:29:14
i have to say that my AP wireless network and the wireless repeater would have different essids, Mywirelessnetwork and repeater.
MarcoNL 2017-01-24 01:29:55
crosspost?
MarcoNL 2017-01-24 01:30:14
petn-randall: what do you mean?
rafalcpp 2017-01-24 01:35:32
Hurr local root exploit thaks to SystemD. It's good we switched to SystemD, that is the trendy thing to do hurrr. https://security-tracker.debian.org/tracker/CVE-2016-10156
rafalcpp 2017-01-24 01:36:40
systemd upstream fixes it quietly
grawity 2017-01-24 01:37:14
hurr let's assign a CVE to something that's not actually exploitable because the kernel doesn't let you write to setuid files, but let's ignore that for now because OMG CVE hurr
rafalcpp 2017-01-24 01:37:17
when can debian return to by default and fully support init systems developed by competent devs? Or is Devuan the only option for that
rafalcpp 2017-01-24 01:38:28
grawity: they claim it is exploitable by http://www.openwall.com/lists/oss-security/2017/01/24/4 - did you tried it and know this is invalid claim?
temp-wifirepeate 2017-01-24 01:38:35
the script i am after should run on a GNU/Linux distro that supports systemd like Debian 8 and the upcoming Debian 9.
grawity 2017-01-24 01:40:17
rafalcpp: yes I did https://i.imgur.com/HUoMrlz.png
petn-randall 2017-01-24 01:43:37
rafalcpp: systemd rants go to /dev/null please. If you have constructive feedback, help fixing the issue. If you want to have sysv init supported in the future, work on that. But ranting in here won't get you anywhere.
petn-randall 2017-01-24 01:44:52
rafalcpp: There's a reason why Devuan never got a stable release out of the door even though they could have just taken wheeze, slapped a new name on it, and just released it (since wheezy works fine without systemd).
rafalcpp 2017-01-24 01:45:05
grawity: indeed. same for appending with echo bar >> foo, as user, to chmod 07777 file