Future versions of Android will be more resilient to exploits, thanks to developers' efforts to integrate the latest Linux kernel defenses into the operating system.
Android's security model relies heavily on the Linux kernel that sits at its core. As such, Android developers have always been interested in adding new security features that are intended to prevent potentially malicious code from reaching the kernel, which is the most privileged area of the operating system.
[...] One new configuration option called CONFIG_DEBUG_RODATA segments the kernel memory into multiple sections and limits how much of this memory is writeable and executable. Attackers need writeable and executable memory pages in order to inject malicious code into them via exploits, and then run that code with kernel privileges.
Another config option, called CONFIG_CPU_SW_DOMAIN_PAN, prevents the kernel from directly accessing user space memory, giving attackers even less control over where their exploits can execute code.
Also reported at The Register.
(Score: 0) by Anonymous Coward on Saturday July 30 2016, @09:33PM
Root should be accessible for developers easily with adb (pc) but not directly from the device since the apps shouldn't be trusted.
I want to develop native apps directly on my phone, but Android SDK+NDK won't even fit. Why do I need gigabytes and gigabytes of shit to build a kilobyte apk file. Fuck Google's bloated fucking bullshit developer tools.
(Score: 2) by Kunasou on Saturday July 30 2016, @10:02PM
Since adb is just 1.2mb... I installed once the developer tools, copied out adb/fastboot and removed the other stuff. They're surely bloated, they even pack emulators by default, since why not? Let's waste hard drive space.