Google patches flaw in Android Kernel Security

Achieving command over Android devices used to be very easy for attackers. This is about to change.

By exploiting memory corruption bugs by, for example, buffer overflows, type confusion or integer overflows, hackers have been able to reuse codes which allow them to achieve arbitrary code executions. In other words: hackers could easily make your phone do things you did not want it to do and show them data you probably do not want them to see.

To prevent this, Google has now patched the vulnerability by adding support for LLVM’s Control Flow Integrity (CFI) to Android’s kernel.

To read more about this click here.

Copyright Lyonsdown Limited 2020