Its a problem with the stack-protector. As a workaround one can add
-fno-stack-protector to the gcc-options at compiletime. Without it the
Package is unusable.

--- old/otpw-1.3/debian/rules   2008-10-04 23:30:01.000000000 +0200
+++ new/otpw-1.3/debian/rules   2008-10-04 23:27:48.000000000 +0200
@@ -32,7 +32,7 @@
        dh_testdir
        
        # Add here commands to compile the package.
-       $(MAKE) CFLAGS="-fPIC -O -ggdb -W -Wall" otpw-gen pam_otpw.so
+       $(MAKE) CFLAGS="-fPIC -O -ggdb -W -Wall -fno-stack-protector" otpw-gen 
pam_otpw.so
        ar r libotpw.a md.o otpw-l.o pam_otpw.o rmd160.o
        ranlib libotpw.a

-- 
/lib/security/pam_otpw.so: undefined symbol: __stack_chk_fail_local
https://bugs.launchpad.net/bugs/247190
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to