Re: [Oracle] Dirty C0w

From: Jared Still <jkstill_at_gmail.com>
Date: Sun, 30 Oct 2016 22:25:44 -0700
Message-ID: <CAORjz=PCwYb+i1mQF_Ve77D5WkxA1cV2BXCy4YpsVAWTTrvkww_at_mail.gmail.com>



My pleasure Carol. :)

On Friday, October 28, 2016, Carol Dacko <dackoc_at_gmail.com> wrote:

> Thanks, Jared!
>
> On Oct 27, 2016 6:45 PM, "Jared Still" <jkstill_at_gmail.com
> <javascript:_e(%7B%7D,'cvml','jkstill_at_gmail.com');>> wrote:
>
>>
>> Heard of Dirty C0w?
>>
>> If not then you probably should learn a little about it.
>>
>> While not remotely exploitable, it is a serious issue for Linux servers
>> that have human user accounts - users can own the box in a couple minutes.
>>
>> Read about it here: http://bit.ly/dirtyc0w
>>
>> Jared Still
>> Certifiable Oracle DBA and Part Time Perl Evangelist
>> Principal Consultant at Pythian
>> Pythian Blog http://www.pythian.com/blog/author/still/
>>
>>

-- 
Jared Still
Certifiable Oracle DBA and Part Time Perl Evangelist
Principal Consultant at Pythian
Pythian Blog http://www.pythian.com/blog/author/still/
Oracle Blog: http://jkstill.blogspot.com
Home Page: http://jaredstill.com

--
http://www.freelists.org/webpage/oracle-l
Received on Mon Oct 31 2016 - 06:25:44 CET

Original text of this message