Re: [Oracle] Dirty C0w
From: Jared Still <jkstill_at_gmail.com>
Date: Sun, 30 Oct 2016 22:25:44 -0700
Message-ID: <CAORjz=PCwYb+i1mQF_Ve77D5WkxA1cV2BXCy4YpsVAWTTrvkww_at_mail.gmail.com>
Date: Sun, 30 Oct 2016 22:25:44 -0700
Message-ID: <CAORjz=PCwYb+i1mQF_Ve77D5WkxA1cV2BXCy4YpsVAWTTrvkww_at_mail.gmail.com>
My pleasure Carol. :)
On Friday, October 28, 2016, Carol Dacko <dackoc_at_gmail.com> wrote:
> Thanks, Jared!
>
> On Oct 27, 2016 6:45 PM, "Jared Still" <jkstill_at_gmail.com
> <javascript:_e(%7B%7D,'cvml','jkstill_at_gmail.com');>> wrote:
>
>>
>> Heard of Dirty C0w?
>>
>> If not then you probably should learn a little about it.
>>
>> While not remotely exploitable, it is a serious issue for Linux servers
>> that have human user accounts - users can own the box in a couple minutes.
>>
>> Read about it here: http://bit.ly/dirtyc0w
>>
>> Jared Still
>> Certifiable Oracle DBA and Part Time Perl Evangelist
>> Principal Consultant at Pythian
>> Pythian Blog http://www.pythian.com/blog/author/still/
>>
>>
-- Jared Still Certifiable Oracle DBA and Part Time Perl Evangelist Principal Consultant at Pythian Pythian Blog http://www.pythian.com/blog/author/still/ Oracle Blog: http://jkstill.blogspot.com Home Page: http://jaredstill.com -- http://www.freelists.org/webpage/oracle-lReceived on Mon Oct 31 2016 - 06:25:44 CET