www. O S N E W S .com
News Features Interviews
BlogContact Editorials

Hardening the kernel in Android Oreo
By Thom Holwerda on 2017-09-02 00:34:32

The hardening of Android's userspace has increasingly made the underlying Linux kernel a more attractive target to attackers. As a result, more than a third of Android security bugs were found in the kernel last year. In Android 8.0 (Oreo), significant effort has gone into hardening the kernel to reduce the number and impact of security bugs.

Android Nougat worked to protect the kernel by isolating it from userspace processes with the addition of SELinux ioctl filtering and requiring seccomp-bpf support, which allows apps to filter access to available system calls when processing untrusted input. Android 8.0 focuses on kernel self-protection with four security-hardening features backported from upstream Linux to all Android kernels supported in devices that first ship with this release.

Is it common to have to backport security features of newer Linux versions to older ones? Or is this just a peculiarity of Android's Linux kernel being so far behind the times?

8  Comments - Printer friendly - Related stories
Recent related stories
- The good and bad of Samsung's One UI interface - 2018-11-13
- APEX furthers the Android modularization started by Treble - 2018-11-10
- Samsung shows off its smartphone with foldable display - 2018-11-08
- Google mandates two years of Android security updates - 2018-10-24
- Network of more than 125 Android apps used in ad fraud scheme - 2018-10-23
- More related articles
 

Tell a friend
Your full name:
Your email address:
Your friend's email:
Anti-spam measure:
5+2=

News Features Interviews
BlogContact Editorials


WAP site - RSS feed
© OSNews LLC 1997-2007. All Rights Reserved.
The readers' comments are owned and a responsibility of whoever posted them.
Prefer the desktop version of OSNews?