|Hardening the kernel in Android Oreo|
|By Thom Holwerda on 2017-09-02 00:34:32|
The hardening of Android's userspace has increasingly made the underlying Linux kernel a more attractive target to attackers. As a result, more than a third of Android security bugs were found in the kernel last year. In Android 8.0 (Oreo), significant effort has gone into hardening the kernel to reduce the number and impact of security bugs.
Android Nougat worked to protect the kernel by isolating it from userspace processes with the addition of SELinux ioctl filtering and requiring seccomp-bpf support, which allows apps to filter access to available system calls when processing untrusted input. Android 8.0 focuses on kernel self-protection with four security-hardening features backported from upstream Linux to all Android kernels supported in devices that first ship with this release.
Is it common to have to backport security features of newer Linux versions to older ones? Or is this just a peculiarity of Android's Linux kernel being so far behind the times?
- APEX furthers the Android modularization started by Treble - 2018-11-10
- Samsung shows off its smartphone with foldable display - 2018-11-08
- Google mandates two years of Android security updates - 2018-10-24
- Network of more than 125 Android apps used in ad fraud scheme - 2018-10-23
- More related articles