So it's more like a digital version of a "poodle piddle puddle". So, "watch your step". :-)
> -----Original Message----- > From: Linux on 390 Port On Behalf Of Mark Post > > All, the SUSE Director of SUSE Linux Enterprise sent this note internally. I > thought it was a really > nice explanation of this vulnerability and why it can't just be fixed with > code changes. I recommend > everyone read it. > > > Date: Mon, 20 Oct 2014 08:44:15 +0200 > > From: Olaf Kirch > > > > Hi all, > > > > for those of you looking for more detailed information on POODLE and > > its implications, I published a blog posting on Saturday. Feel free to > > refer your customers and partners to it. > > > > https://www.suse.com/communities/conversations/understanding-poodle/ > > > Mark Post > > ---------------------------------------------------------------------- > For LINUX-390 subscribe / signoff / archive access instructions, send email > to [email protected] > with the message: INFO LINUX-390 or visit > http://www.marist.edu/htbin/wlvindex?LINUX-390 > ---------------------------------------------------------------------- > For more information on Linux on System z, visit http://wiki.linuxvm.org/ ********************************************************************** Information contained in this e-mail message and in any attachments thereto is confidential. If you are not the intended recipient, please destroy this message, delete any copies held on your systems, notify the sender immediately, and refrain from using or disclosing all or any part of its content to any other person. ---------------------------------------------------------------------- For LINUX-390 subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO LINUX-390 or visit http://www.marist.edu/htbin/wlvindex?LINUX-390 ---------------------------------------------------------------------- For more information on Linux on System z, visit http://wiki.linuxvm.org/
