<div dir="ltr"><div>And?<br><br></div>Honestly, the way people create names and websites for these things, you'd think it's a fund-raiser for something, not a critical security bug.<br></div><div class="gmail_extra"><br><div class="gmail_quote">On Fri, Oct 21, 2016 at 5:22 PM, I <span dir="ltr"><<a href="mailto:beatthebastards@inbox.com" target="_blank">beatthebastards@inbox.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel<br>
<br>
<a href="http://dirtycow.ninja/" rel="noreferrer" target="_blank">http://dirtycow.ninja/</a><br>
<br>
<br>
______________________________<wbr>_________________<br>
tor-relays mailing list<br>
<a href="mailto:tor-relays@lists.torproject.org">tor-relays@lists.torproject.<wbr>org</a><br>
<a href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays" rel="noreferrer" target="_blank">https://lists.torproject.org/<wbr>cgi-bin/mailman/listinfo/tor-<wbr>relays</a><br>
</blockquote></div><br><br clear="all"><br>-- <br><div class="gmail_signature" data-smartmail="gmail_signature">Finding information, passing it along. ~SuperSluether</div>
</div>