aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Kralevich <nnk@google.com>2012-06-29 10:05:56 -0700
committerNick Kralevich <nnk@google.com>2012-06-29 10:05:56 -0700
commitc3cee19c8059fcfb5d41c6d6c1e28e834daf4efe (patch)
tree91b2f4071fbc4b2cdc5dd654351fa8ef67909f0e
parentbe8b5b2209aff29462687279847137a08da239e5 (diff)
downloadsource.android.com-c3cee19c8059fcfb5d41c6d6c1e28e834daf4efe.tar.gz
fix version number for older security featuresandroid-cts-4.1_r1
Change-Id: I7a9e0ab6430ced37e2662d8252bfa184958cb2ff
-rw-r--r--src/tech/security/index.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/tech/security/index.md b/src/tech/security/index.md
index b3845462..68e65aff 100644
--- a/src/tech/security/index.md
+++ b/src/tech/security/index.md
@@ -319,7 +319,7 @@ Android includes many features that make common security issues harder to
exploit. The Android SDK, compilers, and OS use tools to make common memory
corruption issues significantly harder to exploit, including:
-**Android 2.2+**
+**Android 1.5+**
+ ProPolice to prevent stack buffer overruns (-fstack-protector)
+ safe_iop to reduce integer overflows