lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 11 Oct 2021 14:43:25 +0000 From: bugzilla-daemon@...zilla.kernel.org To: linux-ext4@...r.kernel.org Subject: [Bug 214665] security bug:using "truncate" bypass disk quotas limit https://bugzilla.kernel.org/show_bug.cgi?id=214665 Theodore Tso (tytso@....edu) changed: What |Removed |Added ---------------------------------------------------------------------------- Status|REOPENED |RESOLVED Resolution|--- |INVALID --- Comment #4 from Theodore Tso (tytso@....edu) --- As Lukas said, "truncate" is not the only way to create sparse files. And there are many Unix / Linux programs that depend on the ability to create sparse files, since Unix support of sparse files goes back at roughly 50 years (half a century). The fact that clueless users / sysadmins might not understand basic Unix/Linux behavior is not a bug in Linux. There are plenty of other ways that an experienced sysadmin might shoot themselves in the foot.... -- You may reply to this email to add a comment. You are receiving this mail because: You are watching the assignee of the bug.
Powered by blists - more mailing lists