


Android's Latest Update Doesn't Patch Major Security Flaw 'Dirty COW' (engadget.com) 23
The November Android security update is live and it fixes 15 critical vulnerabilities, but it doesn't patch a major Linux kernel exploit that can give hackers quick and complete access to devices running on Google's OS. From a report on Engadget: Researcher Phil Oester discovered the flaw (CVE-2016-5195) in October, though he believes it's existed since 2007. The exploit is known as "Dirty COW" because of its basis in copy-on-write systems (and maybe because that name is adorable). With this month's security update, Google did roll out a "supplemental" firmware fix for Dirty COW across Nexus and Pixel devices. Plus, Samsung released a patch for its devices this month, according to Threatpost. An official Android patch for the Dirty COW issue is expected to land in December.
My Grandma asked if she should be worried. (Score:4, Insightful)
I told her to root her phone, get the source code and fix it herself.
Problem solved.
Re: (Score:2)
I told her to root her phone,
In Australia when you use root as a verb it means to procreate. (yes this is a problem given how "gaining root access" is a more common discussion)
I now cannot get that image out of my head. Thanks for ruining my day.
Re: (Score:2)
What did she say and did she do it? :P
Re: (Score:2)
Re: (Score:2)
RedHat patches (Score:2)
RedHat released backported Dirty Cow patches for the 2.6.18 kernel in EL5 last Friday.
Why isn't Google using a RedHat kernel in Android, and applying the backported updates to /boot and /system, around OEM drivers?
Why is the kernel "untouchable" by Google on non-Nexus devices? It didn't have to be this way. RedHat certainly makes kernel updates work with 3rd-party drivers. Oracle ksplice can even apply them without a reboot.
The Cow Meme (Score:2)
All you Dirty COWs go moo.
Non-story (Score:2)