A serious code-execution vulnerability in Android 4.3 and earlier was patched in KitKat, the latest version of the operating system. Researchers at IBM this week disclosed the nature of the vulnerability, which was privately disclosed to the Android Security Team in September and patched last November. “Considering Android’s fragmented nature and the fact that this was a code-execution vulnerability, we decided to wait a bit with the public disclosure,” said Roee Hay, a security research group leader at IBM. Hay’s team found a stack-based buffer overflow vulnerability in Android’s KeyStore service, which according to the Android developers’ website is responsible for storing and securing a device’s cryptographic keys.