Linked by Thom Holwerda on Sat 2nd Sep 2017 00:34 UTC
Android

The hardening of Android's userspace has increasingly made the underlying Linux kernel a more attractive target to attackers. As a result, more than a third of Android security bugs were found in the kernel last year. In Android 8.0 (Oreo), significant effort has gone into hardening the kernel to reduce the number and impact of security bugs.

Android Nougat worked to protect the kernel by isolating it from userspace processes with the addition of SELinux ioctl filtering and requiring seccomp-bpf support, which allows apps to filter access to available system calls when processing untrusted input. Android 8.0 focuses on kernel self-protection with four security-hardening features backported from upstream Linux to all Android kernels supported in devices that first ship with this release.

Is it common to have to backport security features of newer Linux versions to older ones? Or is this just a peculiarity of Android's Linux kernel being so far behind the times?

Thread beginning with comment 648517
To view parent comment, click here.
To read all comments associated with this story, please click here.
cb88
Member since:
2009-04-23

There is actually an effort to make Android self hosting by Rob Landley (author of the aboriginal distro and toybox swiss army knife busybox alike and one of the former maintainers of busybox)

And guess what.. its BSD licensed not GPL.

Basically its a from scratch rewrite of busybox with an aim to be able to self host Linux/Android builds, clean code (thats probably subjective though), and adherence to specs.

Reply Parent Score: 2