Bug#669114: vgabios doesn't have QXGA VBE resolution entries
On 17.04.2012 16:04, Sven Schnelle wrote: > Package: vgabios > Version: 0.7a-2 > Severity: wishlist > > I'm using kvm + vgabios on a QXGA resolution screen. Unfortunately, it doesn't > have this resolution in its VBE tables. Here's a patch to add it: > > diff -Naur vgabios-0.6c.ori/vbetables-gen.c vgabios-0.6c/vbetables-gen.c > --- vgabios-0.6c.ori/vbetables-gen.c2012-04-17 11:17:30.129152478 +0200 > +++ vgabios-0.6c/vbetables-gen.c2009-01-25 16:46:08.0 +0100 > @@ -73,9 +73,12 @@ > { 1920, 1200, 16 , 0x187}, > { 1920, 1200, 24 , 0x188}, > { 1920, 1200, 32 , 0x189}, > +{ 2048, 1536, 16,, 0x18a}, > +{ 2048, 1536, 16,, 0x18b}, > +{ 2048, 1536, 16,, 0x18c}, > +{ 2560, 1600, 16 , 0x18d}, > +{ 2560, 1600, 24 , 0x18e}, > +{ 2560, 1600, 32 , 0x18f}, > -{ 2560, 1600, 16 , 0x18a}, > -{ 2560, 1600, 24 , 0x18b}, > -{ 2560, 1600, 32 , 0x18c}, You're changing existing mode IDs this way. Why? Thanks, /mjt -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4fd9949f.40...@msgid.tls.msk.ru
Bug#677439: Please enable pam_loginuid by default
Hi, So let's try to be more clear about this bug. pam_loginuid is used to track user login. This module is needed by different things: the audit daemon, consolekit and systemd (for the later, the lack of calling this module, produces some nasty issues, like breaking sudo). The module must only be called in login-like services (login, xDM,...) and not in services like sudo as this is defeating the purpose of having a UID per login. The pam-auth-update is currently laking (see #677288) a way to add modules to login services only. pam_loginuid.so module is already present in the libpam-modules package which is Priority: required which means it's installed on every system by default. The module need to be added in between the call to selinux close/open and before pam_ck_connector modules (if they are already present in your pam service file), I also recommend to add it before the common-session(-noninteractive) include. For example: session requiredpam_selinux.so close [...] session requiredpam_loginuid.so << Add it here @include common-session session requiredpam_selinux.so open Cheers Laurent Bigonville -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20120614114827.27602...@eldamar.bigon.be
PATCH: openssl-tpm-engine / libengine-tpm-openssl patch to make UI user data work
Callback data was not being propagated back to the UI_method callbacks. This patch fixes it. Attaching two patches since one applies cleanly to the debian stable code and one to the git HEAD. Also pushed to github: https://github.com/ThomasHabets/openssl-tpm-engine https://github.com/ThomasHabets/openssl-tpm-engine/commit/bac39e02f09e8522061de4b6b6f51e9523bf7137 -- typedef struct me_s { char name[] = { "Thomas Habets" }; char email[] = { "tho...@habets.pp.se" }; char kernel[] = { "Linux" }; char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt"; }; char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; } me_t; libengine-tpm-openssl-cbdata.patch Description: Binary data openssl-tpm-engine.patch Description: Binary data
Re: PATCH: openssl-tpm-engine / libengine-tpm-openssl patch to make UI user data work
Thanks Thomas, I'll take a look at this soon. If you'd like it upstreamed you will need to add a Signed-off-by: line with your name and address though. By adding the sign off you're agreeing to the developer's certificate of origin: http://trousers.sourceforge.net/dco.text Thanks, Kent On Thu, Jun 14, 2012 at 12:00 PM, Thomas Habets wrote: > Callback data was not being propagated back to the UI_method > callbacks. This patch fixes it. > > Attaching two patches since one applies cleanly to the debian stable > code and one to the git HEAD. > > Also pushed to github: > https://github.com/ThomasHabets/openssl-tpm-engine > https://github.com/ThomasHabets/openssl-tpm-engine/commit/bac39e02f09e8522061de4b6b6f51e9523bf7137 > > -- > typedef struct me_s { > char name[] = { "Thomas Habets" }; > char email[] = { "tho...@habets.pp.se" }; > char kernel[] = { "Linux" }; > char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt"; }; > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; > } me_t; -- IBM LTC Security -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/cam0nabe_fdridxdvaipsyuk3wx0s+j9qmmgxifegxfdzn2r...@mail.gmail.com
Re: PATCH: openssl-tpm-engine / libengine-tpm-openssl patch to make UI user data work
On 14 June 2012 22:24, Kent Yoder wrote: > Thanks Thomas, I'll take a look at this soon. If you'd like it > upstreamed you will need to add a Signed-off-by: line with your name > and address though. By adding the sign off you're agreeing to the > developer's certificate of origin: > http://trousers.sourceforge.net/dco.text Thanks. Added: Signed-off-by: Thomas Habets To the attached patch, which is the version that should apply cleanly to upstream. I'm the author and there are no objections to submitting this from my employer or anyone else. > > Thanks, > Kent > > On Thu, Jun 14, 2012 at 12:00 PM, Thomas Habets wrote: >> Callback data was not being propagated back to the UI_method >> callbacks. This patch fixes it. >> >> Attaching two patches since one applies cleanly to the debian stable >> code and one to the git HEAD. >> >> Also pushed to github: >> https://github.com/ThomasHabets/openssl-tpm-engine >> https://github.com/ThomasHabets/openssl-tpm-engine/commit/bac39e02f09e8522061de4b6b6f51e9523bf7137 >> >> -- >> typedef struct me_s { >> char name[] = { "Thomas Habets" }; >> char email[] = { "tho...@habets.pp.se" }; >> char kernel[] = { "Linux" }; >> char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt"; }; >> char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; >> char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; >> } me_t; > > > > -- > IBM LTC Security openssl-tpm-engine.patch Description: Binary data
Bug#674006: runtime tested solution found
Please find attached a new debian/rules file for wvstreams which appears to fix this bug. It is altered in two places to switch off some compiler optimizations. It is obviously a hack. This has been runtime tested on borrowed hardware. This follows Fabrice's suggestions. Proper diff and packaging will follow. It would be great if someone else also tests this in runtime context. very best regards, Peter rules Description: Binary data