diff options
author | Nick Kralevich <nnk@google.com> | 2012-06-29 10:05:56 -0700 |
---|---|---|
committer | Nick Kralevich <nnk@google.com> | 2012-06-29 10:05:56 -0700 |
commit | c3cee19c8059fcfb5d41c6d6c1e28e834daf4efe (patch) | |
tree | 91b2f4071fbc4b2cdc5dd654351fa8ef67909f0e | |
parent | be8b5b2209aff29462687279847137a08da239e5 (diff) | |
download | source.android.com-c3cee19c8059fcfb5d41c6d6c1e28e834daf4efe.tar.gz |
fix version number for older security featuresandroid-cts-4.1_r1
Change-Id: I7a9e0ab6430ced37e2662d8252bfa184958cb2ff
-rw-r--r-- | src/tech/security/index.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/tech/security/index.md b/src/tech/security/index.md index b3845462..68e65aff 100644 --- a/src/tech/security/index.md +++ b/src/tech/security/index.md @@ -319,7 +319,7 @@ Android includes many features that make common security issues harder to exploit. The Android SDK, compilers, and OS use tools to make common memory corruption issues significantly harder to exploit, including: -**Android 2.2+** +**Android 1.5+** + ProPolice to prevent stack buffer overruns (-fstack-protector) + safe_iop to reduce integer overflows |