Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

88 'high-risk' security flaws found in Android Kernel

An Android kernel audit uncovered 88 "high-risk flaws" that have significant potential to cause security vulnerabilities, data loss, or quality issues such as system crashes.

According to Coverity, a firm dedicated to code analysis, high-risk flaws include memory corruption failures, illegal memory access, and resource leaks.

The analysis was performed on the kernel 2.6.32 of Android "froyo". This kernel is geared towards smartphones based on the Qualcomm MSM7xxx/QSD8×50 chipset , specifically the HTC Droid Incredible. In addition to the standard kernel , this version includes support for wireless access, touch screen and camera drivers .

Here are the essentials of what Coverity found:

  • The Android kernel used in the HTC Droid Incredible has about half the flaws you'd expect in similar software of the same size.
  • The Android kernel has a better average than the industry in error density (one defect per 1,000 lines of code); however the report uncovered 359 flaws believed to be in the shipped version of the HTC Droid Incredible. We believe that the defects we found are an example of what could be shipped on many OEM devices and products that rely on the Android platform.
  • We found 88 high-risk defects in Android: 25% of the defects discovered in Android, including memory corruptions, illegal memory accesses and resource leaks that are considered high risk with considerable potential to cause security vulnerabilities, data loss, or quality issues such as system crashes. These are types of defects that many of our customers fix and eliminate completely before dispatching a product.
  • Responsibility for the integrity of Android software is fragmented. The problem is no different with Android than what we see through open source. Android is based on Linux, which has thousands of contributors. Add to that Google's Android developers, Android contributors from the large developer community, and OEMs that provide components for Android-specific configurations to support different types of devices, and the lines of responsibility quickly become blurred. It's unclear who is ultimately responsible, but it's clear that a new level of visibility is needed to give OEMs incorporating Android into their software supply chain an objective measure of Android software integrity.
Translation: Raul Batista - Segu-Info
Author: Ryan Naraine
Source: ZDNet Blogs

- Publicidad -

See original.

No thoughts on “88 'high-risk' security flaws found in Android Kernel”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter