brute force with hydra 5.1 and with follow keys (basically, any ssh brute force): hydra -l root -P /usr/share/dict/cracklib-small -t localhost ssh2 with give a lot of errors to stdout: *** glibc detected *** double free or corruption (!prev): 0x08060320 *** additional info: glibc-2.3.6-r3 make.conf: CFLAGS="-Os -pipe -march=pentium-m -fomit-frame-pointer -fforce-addr" USE="dri -gtk -gnome logrotate directfb oss samba dts mng ethereal svga curl usb snmp audiofile hal java flac bash -completion lirc bzip2 slang gmp ffmpeg xvid imagemagick tiff xml2 qt kde kdeenablefinal alsa -oss arts -gs treamer -xmms dbus cdr nls nptl nptlonly wifi pcmcia sdk xine irda sse sse2 mmx logitech-mouse acpi -apm ithreads"
Actually, the latest version is 5.3 (see request 133083) and this bug has been fixed there. Please submit new version to the portage.
Thank you for report Anton! New version is in cvs. So I hope the issue is solved :)