Summary: | sys-kernel/hardened-sources-3.4.7: ssh Not tainted, PAX: size overflow detected in function tcp_recvmsg net/ipv4/tcp.c:1696 | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Nikoli <nikoli> |
Component: | Hardened | Assignee: | Anthony Basile <blueness> |
Status: | RESOLVED DUPLICATE | ||
Severity: | normal | CC: | hardened, pageexec, re.emese, spender |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Attachments: |
kernel config
System.map-3.4.7-hardened.xz |
Description
Nikoli
2012-08-27 20:45:25 UTC
Created attachment 322390 [details]
kernel config
Created attachment 322393 [details]
System.map-3.4.7-hardened.xz
It's a false positive, according to upstream:- http://forums.grsecurity.net/viewtopic.php?f=1&t=2991#p11910 (In reply to comment #2) > It's a false positive, according to upstream:- > > http://forums.grsecurity.net/viewtopic.php?f=1&t=2991#p11910 Is it a problem in the most recent hardened-sources added to the tree? it's a dupe of bug #430906. *** This bug has been marked as a duplicate of bug 430906 *** |