Its a problem with the stack-protector. As a workaround one can add
-fno-stack-protector to the gcc-options at compiletime. Without it the
Package is unusable.
--- old/otpw-1.3/debian/rules 2008-10-04 23:30:01.000000000 +0200
+++ new/otpw-1.3/debian/rules 2008-10-04 23:27:48.000000000 +0200
@@ -32,7 +32,7 @@
dh_testdir
# Add here commands to compile the package.
- $(MAKE) CFLAGS="-fPIC -O -ggdb -W -Wall" otpw-gen pam_otpw.so
+ $(MAKE) CFLAGS="-fPIC -O -ggdb -W -Wall -fno-stack-protector" otpw-gen
pam_otpw.so
ar r libotpw.a md.o otpw-l.o pam_otpw.o rmd160.o
ranlib libotpw.a
--
/lib/security/pam_otpw.so: undefined symbol: __stack_chk_fail_local
https://bugs.launchpad.net/bugs/247190
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs