Summary: | PAX: size overflow detected (copy_siginfo_to_user32) | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Martijn <kleptog> |
Component: | Hardened | Assignee: | The Gentoo Linux Hardened Team <hardened> |
Status: | RESOLVED OBSOLETE | ||
Severity: | minor | CC: | pageexec, spender |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | AMD64 | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Martijn
2013-07-18 11:28:39 UTC
Please try with hardened-sources-3.10.1. Upstream will want to see if the failure is still happening on their latest grsecurity patches. i think this was CVE-2013-2141. Okay, 3.8.6 is off the tree and this is likely a known issue. @user, please use a newer version of hardened-sources. Ok, thanks for the feedback. We'll try upgrading and see which new bugs we run into... |