Google has issued a statement regarding the recently reported WebView security flaw that affects devices running Android 4.3 Jelly Bean and older versions, a flaw that potentially puts over 900 million users at risk. The statement is essentially a follow-up to the Android security team's earlier response that it is up to OEMs to address the issue, and that the company has already addressed the issue with the release of Android 4.4 KitKat and Android 5.0 Lollipop.
For those who are unaware, WebView is a part of the Android OS that lets app developers render webpages in apps without requiring a full browser. The component was based on the Webkit engine, which was replaced by Google's Chromium engine when Android 4.4 KitKat launched, resolving the reported vulnerability in WebView and also enabling quick binary updates to the component via OEM updates. Android 5.0 Lollipop then unbundled WebView from the operating system, allowing it to be downloaded and updated separately by users from Google Play - without requiring an OEM fix.
Adrian Ludwig, from Google's Android security team, in a Google+ post on Friday says Google issues bug fixes to the current version of Android on the Android Open Source Project (AOSP) page, and directly provides patches "Android partners with patches for at least the last two major versions of the operating system."
Ludwig said that improving WebView and browser security is one of the areas where the company has made the "greatest progress", detailing the changes made with Android 4.4 KitKat and Android 5.0 Lollipop. He added that it is no longer feasible to update more than 2-year-old versions of WebView, which has more than 5 million lines of code and has seen hundreds of new 'commits' a month from developers since then. Ludwig says it is up to the OEM to issue an update for the issue, ideally by updating the devices running on OS versions older than Android 4.3 Jelly Bean to Android 4.4 KitKat.
Users of Android 4.3 Jelly Bean and older devices can stay safe and unaffected by WebView bugs, Ludwig points out, by using browsers that have their own rendering engine, like Firefox or Chrome. "Using an updatable browser will protect you from currently known security issues, and since it can be updated in the future it will also protect you against any issues that might be found in the future," Ludwig added on his Google+ post.
It is the apps that open the web pages in their own inbuilt browser, which are vulnerable. Users can get rid of these apps or disable the inbuilt browser option from inside the app. Ludwig, for developers, added that they too can contribute in avoiding the WebView bug by following Google's "security best practices" and by making sure only trusted web pages with 'HTTPS' open in their applications.
To add some context, Google's latest distribution data of different versions of Android has revealed that Android 5.0 Lollipop, the latest publicly available version of Google's mobile and tablet operating system, is powering less than 0.1 percent of Android devices while Android KitKat has a total share of 39.1 percent. The distribution data of different versions of Android also revealed that Android Jelly Bean still powers the greater part of Android devices, with a combined percentage of 46 percent.
Interestingly, Google a company that says it will not be able to rollout a fix for the WebView bug to the majority of Android users has been lately publishing the OS security flaws of Microsoft and Apple, albeit after giving them 90-days to provide bug fixes. According to the latest report, Google has revealed two new flaws in Apple's OS X operating system. The search giant recently also revealed a number of security holes in Microsoft's Windows 7 and Windows 8.1 OS versions, despite Microsoft's request to hold off for a few days until the patch was rolled out.