On Tuesday 13 August 2013 05:50 PM, Paul Slootman wrote:
On Tue 13 Aug 2013, Matthias Schniedermeyer wrote:
BUT there is no direct vulnerability in that, only processes after that
(like backup/rsync) can make a vulnerability out of it.
... which is what I already wrote.


Paul
So the solutions is to upgrade the kernel to 3.6 in all Operating systems installations. ? If it is one server , then it was a solution. Is it possible to add a flag to exclude hard inks of regular file instead of waiting the OS vendors for updating there kernel to 3.6

--
--------------------------------------
Regards
Sherin A
http://www.sherin.co.in/

--
Please use reply-all for most replies to avoid omitting the mailing list.
To unsubscribe or change options: https://lists.samba.org/mailman/listinfo/rsync
Before posting, read: http://www.catb.org/~esr/faqs/smart-questions.html

Reply via email to