Re: [Oracle] Dirty C0w
From: Carol Dacko <dackoc_at_gmail.com>
Date: Fri, 28 Oct 2016 10:51:32 -0400
Message-ID: <CABUxq=cUtA3UDwastiNGWCxQETNGqsFk=qKEw0sqnxAH0EmZZA_at_mail.gmail.com>
Date: Fri, 28 Oct 2016 10:51:32 -0400
Message-ID: <CABUxq=cUtA3UDwastiNGWCxQETNGqsFk=qKEw0sqnxAH0EmZZA_at_mail.gmail.com>
Thanks, Jared!
On Oct 27, 2016 6:45 PM, "Jared Still" <jkstill_at_gmail.com> wrote:
>
> Heard of Dirty C0w?
>
> If not then you probably should learn a little about it.
>
> While not remotely exploitable, it is a serious issue for Linux servers
> that have human user accounts - users can own the box in a couple minutes.
>
> Read about it here: http://bit.ly/dirtyc0w
>
> Jared Still
> Certifiable Oracle DBA and Part Time Perl Evangelist
> Principal Consultant at Pythian
> Pythian Blog http://www.pythian.com/blog/author/still/
>
>
-- http://www.freelists.org/webpage/oracle-lReceived on Fri Oct 28 2016 - 16:51:32 CEST