|Hardening the kernel in Android Oreo|
|By Thom Holwerda on 2017-09-02 00:34:32|
The hardening of Android's userspace has increasingly made the underlying Linux kernel a more attractive target to attackers. As a result, more than a third of Android security bugs were found in the kernel last year. In Android 8.0 (Oreo), significant effort has gone into hardening the kernel to reduce the number and impact of security bugs.
Android Nougat worked to protect the kernel by isolating it from userspace processes with the addition of SELinux ioctl filtering and requiring seccomp-bpf support, which allows apps to filter access to available system calls when processing untrusted input. Android 8.0 focuses on kernel self-protection with four security-hardening features backported from upstream Linux to all Android kernels supported in devices that first ship with this release.
Is it common to have to backport security features of newer Linux versions to older ones? Or is this just a peculiarity of Android's Linux kernel being so far behind the times?
- Chat is Google's next big fix for Android's messaging mess - 2018-04-20
- Liberating MediaTek bootloaders and modem firmware - 2018-04-16
- How Android phones hide missed security updates - 2018-04-12
- Android Studio 3.1 released - 2018-03-27
- More related articles