If Sean Gallagher's screed detailing an ICS/SCADA hardware flaw, at our go-to site of popular intelligence - Ars Technica) wasn't brimmed-up full of schadenfreude, I'd be crying in outrage (specifically, at the vendor stupidity illuminated by the bright and shiny light of Mr. Gallagher's magical prose) instead of howling happily on a similarly bright, yet cloudy Sunday morn... Anyhow, to the point; into SCADA / ICS security foible's? This one's' for youse!
Damn kids apparently have forgotten their lessons whilst in kindergarten regarding safe and fair play. In this case, however, we have the added component of organizations, companies and individuals suffering due to the ineptitude of the big names in Linux... Astounding.
Via the eponymous Dan Goodin, writing at ArsTechnica, comes news of the latest flaw in Android, this time, based on DirtyCow code. Our take? Be prepared to mitigate this flaw ASAP. The timeline for exploit mitigation on Android? Unknown, due to the lack of established patch management planning by the major manufacturers.... Astonishing.
"Now that the Dirty Cow hole has been patched in the Linux kernel, it's only a matter of time until the fix makes its way into Android, too...." "Of course, that's not available for a large number of devices, mostly because of limitations set by manufacturers and carriers." - via ArsTechnica's Dan Goodin