Hi N-Ronny,
I have never debugged openvpn/pam in that regard myself.
But I hapened to find https://github.com/Yubico/yubico-pam/issues/26 which made 
me wonder.
The version is clearly older.

Now both (the yubico.so and openvpn) are build with -fstack-protector and 
-fstack-protector-strong.
https://launchpadlibrarian.net/294924689/buildlog_ubuntu-xenial-amd64.yubico-pam_2.24-1~ppa1~xenial1_BUILDING.txt.gz
https://launchpadlibrarian.net/236028083/buildlog_ubuntu-xenial-amd64.openvpn_2.3.10-1ubuntu2_BUILDING.txt.gz

One other thing you could do is enabling some other (than yubico) pam
based auth for openvpn to at least sort out the question if it is yubico
or openvpn where you need to look at.

** Bug watch added: github.com/Yubico/yubico-pam/issues #26
   https://github.com/Yubico/yubico-pam/issues/26

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1659592

Title:
  ***stack smashing detected***: /usr/sbin/openvpn: If libpam_yubico is
  used for authentication for 2FA.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1659592/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to