diff options
author | Android Partner Docs <noreply@android.com> | 2018-05-07 15:51:34 -0700 |
---|---|---|
committer | Clay Murphy <claym@google.com> | 2018-05-07 16:25:44 -0700 |
commit | 2f461f591c376486cd89434562131471c10fb1d2 (patch) | |
tree | 32d9f50448ba01b98916d555c04e68ac123eb99b /en | |
parent | 008a9e0bf136d461480396e6971347ce1c8b9484 (diff) | |
download | source.android.com-2f461f591c376486cd89434562131471c10fb1d2.tar.gz |
Docs: Changes to source.android.com
- 195735838 Omit Nexus 6P build for now, this is a follow up of cr/19... by Android Partner Docs <noreply@android.com>
- 195718504 Tags for 2018/05 Security Release. by Android Partner Docs <noreply@android.com>
- 195700751 Update all tenant freezes to contain last_published_cl: 0. by Android Partner Docs <noreply@android.com>
- 195685647 Add last month's enhancements to News section on home by Clay Murphy <claym@google.com>
- 195679418 Cloned from CL 194466703 by 'g4 patch'. by Clay Murphy <claym@google.com>
- 195463680 Exclude 2017 Pixel bulletins from localization by Danielle Roberts <daroberts@google.com>
- 195438214 Devsite localized content from translation request 0bd594... by Android Partner Docs <noreply@android.com>
- 195434804 Change from preview link to link that it resolved to. by Danielle Roberts <daroberts@google.com>
- 195307570 Devsite localized content from translation request 315297... by Android Partner Docs <noreply@android.com>
- 195268816 Fix spelling: passthough -> passthrough. by Mark Hecomovich <mheco@google.com>
- 195268432 Devsite localized content from translation request 7a2fd8... by Android Partner Docs <noreply@android.com>
- 195198267 Update modular kernel requirements by Android Partner Docs <noreply@android.com>
- 195178304 Remove reference to ccache. by Android Partner Docs <noreply@android.com>
- 195178297 Remove ccache reference. by Android Partner Docs <noreply@android.com>
- 195151900 Minor documentation fixes by Android Partner Docs <noreply@android.com>
PiperOrigin-RevId: 195735838
Change-Id: I4ae193dea515f236487e1533741006cb34a2a2c2
Diffstat (limited to 'en')
-rw-r--r-- | en/_freeze.yaml | 3 | ||||
-rw-r--r-- | en/_index.yaml | 35 | ||||
-rw-r--r-- | en/devices/architecture/hidl/index.html | 2 | ||||
-rw-r--r-- | en/devices/architecture/kernel/modular-kernels.html | 6 | ||||
-rw-r--r-- | en/devices/input/touch-devices.html | 5 | ||||
-rw-r--r-- | en/devices/tech/admin/enterprise-telephony.html | 2 | ||||
-rw-r--r-- | en/security/_toc.yaml | 4 | ||||
-rw-r--r-- | en/security/bulletin/2018-04-01.html | 13 | ||||
-rw-r--r-- | en/security/bulletin/2018-05-01.html | 604 | ||||
-rw-r--r-- | en/security/bulletin/2018.html | 23 | ||||
-rw-r--r-- | en/security/bulletin/_translation.yaml | 4 | ||||
-rw-r--r-- | en/security/bulletin/index.html | 23 | ||||
-rw-r--r-- | en/security/bulletin/pixel/2018-05-01.html | 619 | ||||
-rw-r--r-- | en/security/bulletin/pixel/2018.html | 23 | ||||
-rw-r--r-- | en/security/bulletin/pixel/index.html | 25 | ||||
-rw-r--r-- | en/security/overview/acknowledgements.html | 369 | ||||
-rw-r--r-- | en/setup/build/initializing.html | 2 | ||||
-rw-r--r-- | en/setup/build/requirements.html | 3 | ||||
-rw-r--r-- | en/setup/start/build-numbers.html | 24 |
19 files changed, 1577 insertions, 212 deletions
diff --git a/en/_freeze.yaml b/en/_freeze.yaml index d9f62224..1d4ce6b9 100644 --- a/en/_freeze.yaml +++ b/en/_freeze.yaml @@ -1,2 +1,3 @@ # DevSite V2 is moving to production servers, but sites will not be published unless manually specified. -# This freeze file prevents uploading of content to the production servers in V2 to prevent accidents.
\ No newline at end of file +# This freeze file prevents uploading of content to the production servers in V2 to prevent accidents. +last_published_cl: 0
\ No newline at end of file diff --git a/en/_index.yaml b/en/_index.yaml index 796a08ac..0ba2105f 100644 --- a/en/_index.yaml +++ b/en/_index.yaml @@ -69,28 +69,31 @@ landing_page: image_path: /images/android_stack.png - heading: News items: - - heading: April Security Bulletins + - heading: hikey960 Vendor Partition description: > - The April 2018 Android and Pixel/Nexus Security Bulletins have been - published to support the April security release. + HiKey960 documentation now includes the vendor partition. And CTS + Setup now notes the property <code>ro.product.first_api_level</code> + should be unset (removed) rather than set to 0. buttons: - - label: April 4th, 2018 - path: /security/bulletin/2018-04-01 - - heading: Android 2017 Year in Review + - label: April 11th, 2018 + path: /setup/build/devices + - heading: Bluetooth Low Energy description: > - The Android Security 2017 Year in Review covers everything that happened - in Android Security in 2017. + Implementation instructions have been published for Bluetooth Low + Energy. And Debian is now noted as used along with Ubuntu for testing + Android builds. buttons: - - label: March 15th, 2018 - path: /security/overview/reports - - heading: ART DEX bytecode improvements + - label: April 10th, 2018 + path: /devices/bluetooth/ble + - heading: ccache, Valgrind, and Jack No More description: > - Android runtime (ART) now includes bytecode documentation for - <code>const-method-handle</code> and <code>const-method-type</code>, as - well as updates to <code>invoke-polymorphic</code>. + Android engineering is now recommending against use of ccache. + Similarly, use AddressSanitizer over Valgrind and avoid the Jack + toolchain as Android has added support for Java 8 language features + directly into the current javac and dx set of tools. buttons: - - label: January 19th, 2018 - path: /devices/tech/dalvik/dalvik-bytecode + - label: April 5th, 2018 + path: /devices/tech/debug/asan - classname: devsite-landing-row-100 tf-row-centered items: - buttons: diff --git a/en/devices/architecture/hidl/index.html b/en/devices/architecture/hidl/index.html index 2ff78a12..5790b78c 100644 --- a/en/devices/architecture/hidl/index.html +++ b/en/devices/architecture/hidl/index.html @@ -31,7 +31,7 @@ between codebases that may be compiled independently.</p> <p>HIDL is intended to be used for inter-process communication (IPC). Communication between processes is referred to as <a href="/devices/architecture/hidl/binder-ipc"><em>Binderized</em></a>. For -libraries that must be linked to a process, a <a href="#passthrough">passthough +libraries that must be linked to a process, a <a href="#passthrough">passthrough mode</a> is also available (not supported in Java).</p> <p>HIDL specifies data structures and method signatures, organized in interfaces diff --git a/en/devices/architecture/kernel/modular-kernels.html b/en/devices/architecture/kernel/modular-kernels.html index 70debebe..fd1d8706 100644 --- a/en/devices/architecture/kernel/modular-kernels.html +++ b/en/devices/architecture/kernel/modular-kernels.html @@ -331,9 +331,6 @@ CUSTOM_IMAGE_VERITY_BLOCK_DEVICE := /dev/block/…./by-name/odm <code>fstab</code> file fragments. For example, when specifying an entry to mount <code>/vendor</code> in the device tree, the <code>fstab</code> file must not repeat that entry.</li> -<li>Only <code>/system</code>, <code>/odm</code>, or <code>/vendor</code> can be -mounted early. Android does not include support to mount any other partitions in -<code>init</code> first stage.</li> <li>Partitions requiring <code>verifyatboot</code> <strong>must not</strong> be early mounted (doing so is unsupported).</li> <li>The verity mode/state for verified partitions must be specified in kernel @@ -457,9 +454,6 @@ for AVB</a>.</li> <code>fstab</code> file fragments. For example, if you specify an entry to mount <code>/vendor</code> in the device tree, the <code>fstab</code> file must not repeat that entry.</li> -<li>Only <code>/system</code>, <code>/odm</code>, or <code>/vendor</code> can be -mounted early. Android does not include support to mount any other partitions in -<code>init</code> first stage.</li> <li>VBoot 2.0 does not support <code>verifyatboot</code>, regardless of whether early mount is enabled or not.</li> <li>The verity mode/state for verified partitions must be specified in kernel diff --git a/en/devices/input/touch-devices.html b/en/devices/input/touch-devices.html index 8cbcc66b..e3126ed8 100644 --- a/en/devices/input/touch-devices.html +++ b/en/devices/input/touch-devices.html @@ -226,7 +226,8 @@ and <code>MotionEvent.ACTION_HOVER_EXIT</code>.</p> detect the capabilities of the device.</p> <p>For example, if the device reports the <code>BTN_TOUCH</code> key code, the system will assume that <code>BTN_TOUCH</code> will always be used to indicate whether the tool is -actually touching the screen or is merely in range and hovering.</p> + actually touching the screen. Therefore, <code>BTN_TOUCH</code> should not be used to indicate + that the tool is merely in the range and hovering.</p> </li> <li> <p>Single-touch devices use the following Linux input events:</p> @@ -564,7 +565,7 @@ the characteristics of touches using device-specific units.</p> <p>For example, many touch devices measure the touch contact area using an internal device-specific scale, such as the total number of sensor nodes that were triggered by the touch. This raw size value would -not be meaningful applications because they would need to know about the +not be meaningful to applications because they would need to know about the physical size and other characteristics of the touch device sensor nodes.</p> <p>The system uses calibration parameters encoded in input device configuration files to decode, transform, and normalize the values reported by the touch diff --git a/en/devices/tech/admin/enterprise-telephony.html b/en/devices/tech/admin/enterprise-telephony.html index aee11f3a..95d73bd0 100644 --- a/en/devices/tech/admin/enterprise-telephony.html +++ b/en/devices/tech/admin/enterprise-telephony.html @@ -77,7 +77,7 @@ for contacts in their Dialer Contacts and SMS/MMS Messaging apps.</p> Cross profile contact search should be implemented using the Enterprise Contacts API (<code>ContactsContract.Contacts.ENTERPRISE_CONTENT_FILTER_URI</code> etc.), which can be found in the <a -href="http://developer.android.com/preview/features/afw.html#contacts">EMM developer's overview</a> +href="https://developers.google.com/android/work/overview#contacts">EMM developer's overview</a> on the Android EMM Developers site. </p> diff --git a/en/security/_toc.yaml b/en/security/_toc.yaml index ae1f236f..e125d205 100644 --- a/en/security/_toc.yaml +++ b/en/security/_toc.yaml @@ -47,6 +47,8 @@ toc: section: - title: 2018 Bulletins section: + - title: May + path: /security/bulletin/2018-05-01 - title: April path: /security/bulletin/2018-04-01 - title: March @@ -133,6 +135,8 @@ toc: path: /security/bulletin/pixel/index - title: 2018 Bulletins section: + - title: May + path: /security/bulletin/pixel/2018-05-01 - title: April path: /security/bulletin/pixel/2018-04-01 - title: March diff --git a/en/security/bulletin/2018-04-01.html b/en/security/bulletin/2018-04-01.html index 21bb5aa5..567a352d 100644 --- a/en/security/bulletin/2018-04-01.html +++ b/en/security/bulletin/2018-04-01.html @@ -385,13 +385,6 @@ process.</p> <td>NFC driver</td> </tr> <tr> - <td>CVE-2017-5754</td> - <td>A-69856074<a href="#asterisk">*</a></td> - <td>ID</td> - <td>High</td> - <td>Memory mapping</td> - </tr> - <tr> <td>CVE-2017-16534</td> <td>A-69052594<br /> <a href="https://github.com/torvalds/linux/commit/2e1c42391ff2556387b3cb6308b24f6f65619feb"> @@ -2696,5 +2689,11 @@ security bulletins. <td>April 4, 2018</td> <td>Bulletin revised to include AOSP links.</td> </tr> + <tr> + <td>1.2</td> + <td>May 1, 2018</td> + <td>Bulletin revised to remove CVE-2017-5754 from the Kernel Components section. It now appears + in the May 2018 bulletin.</td> + </tr> </table> </body></html> diff --git a/en/security/bulletin/2018-05-01.html b/en/security/bulletin/2018-05-01.html new file mode 100644 index 00000000..bc45a35b --- /dev/null +++ b/en/security/bulletin/2018-05-01.html @@ -0,0 +1,604 @@ +<html devsite> + <head> + <title>Android Security Bulletin—May 2018</title> + <meta name="project_path" value="/_project.yaml" /> + <meta name="book_path" value="/_book.yaml" /> + </head> + <body> + <!-- + Copyright 2018 The Android Open Source Project + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + //www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. + --> + +<p><em>Published May 7, 2018</em></p> + +<p> +The Android Security Bulletin contains details of security vulnerabilities +affecting Android devices. Security patch levels of 2018-05-05 or later address +all of these issues. To learn how to check a device's security patch level, see +<a href="https://support.google.com/pixelphone/answer/4457705">Check & update +your Android version</a>. +</p> +<p> +Android partners are notified of all issues at least a month before publication. +Source code patches for these issues will be released to the Android Open Source +Project (AOSP) repository in the next 48 hours. We will revise this bulletin with +the AOSP links when they are available. +</p> +<p> +The most severe of these issues is a critical security vulnerability in Media +framework that could enable a remote attacker using a specially crafted file to +execute arbitrary code within the context of a privileged process. The +<a href="/security/overview/updates-resources.html#severity">severity +assessment</a> is based on the effect that exploiting the vulnerability would +possibly have on an affected device, assuming the platform and service +mitigations are turned off for development purposes or if successfully bypassed. +</p> +<p> +We have had no reports of active customer exploitation or abuse of these newly +reported issues. Refer to the <a href="#mitigations">Android and Google Play +Protect mitigations</a> section for details on the +<a href="/security/enhancements/index.html">Android security platform protections</a> +and Google Play Protect, which improve the security of the Android platform. +</p> +<p class="note"> +<strong>Note:</strong> Information on the latest over-the-air update (OTA) and +firmware images for Google devices is available in the +<a href="/security/bulletin/pixel/2018-05-01.html">May +2018 Pixel / Nexus Security Bulletin</a>. +</p> + + +<h2 id="mitigations">Android and Google service mitigations</h2> + +<p> +This is a summary of the mitigations provided by the +<a href="/security/enhancements/index.html">Android security platform</a> +and service protections such as +<a href="https://www.android.com/play-protect">Google Play Protect</a>. +These capabilities reduce the likelihood that security vulnerabilities +could be successfully exploited on Android. +</p> +<ul> +<li>Exploitation for many issues on Android is made more difficult by +enhancements in newer versions of the Android platform. We encourage all users +to update to the latest version of Android where possible.</li> +<li>The Android security team actively monitors for abuse through +<a href="https://www.android.com/play-protect">Google Play Protect</a> +and warns users about +<a href="/security/reports/Google_Android_Security_PHA_classifications.pdf">Potentially +Harmful Applications</a>. Google Play Protect is enabled by default on devices +with <a href="http://www.android.com/gms">Google Mobile Services</a>, and is +especially important for users who install apps from outside of Google +Play.</li> +</ul> + +<h2 id="2018-05-01-details">2018-05-01 security patch level vulnerability details</h2> + +<p> +In the sections below, we provide details for each of the security +vulnerabilities that apply to the 2018-05-01 patch level. Vulnerabilities are +grouped under the component that they affect. There is a description of the +issue and a table with the CVE, associated references, +<a href="#type">type of vulnerability</a>, +<a href="/security/overview/updates-resources.html#severity">severity</a>, +and updated AOSP versions (where applicable). When available, we link the public +change that addressed the issue to the bug ID, like the AOSP change list. When +multiple changes relate to a single bug, additional references are linked to +numbers following the bug ID. +</p> + +<h3 id="android-runtime">Android runtime</h3> +<p>The most severe vulnerability in this section could enable a remote attacker +to access data normally accessible only to locally installed applications with +permissions.</p> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Updated AOSP versions</th> + </tr> + <tr> + <td>CVE-2017-13309</td> + <td>A-73251618</td> + <td>ID</td> + <td>High</td> + <td>8.1</td> + </tr> +</table> + + +<h3 id="framework">Framework</h3> +<p>The most severe vulnerability in this section could enable a local malicious +application to bypass user interaction requirements in order to gain access to +additional permissions.</p> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Updated AOSP versions</th> + </tr> + <tr> + <td>CVE-2017-13310</td> + <td>A-71992105</td> + <td>EoP</td> + <td>High</td> + <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> + <tr> + <td>CVE-2017-13311</td> + <td>A-73252178</td> + <td>EoP</td> + <td>High</td> + <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> +</table> + + +<h3 id="media-framework">Media framework</h3> +<p>The most severe vulnerability in this section could enable a local malicious +application to bypass user interaction requirements in order to gain access to +additional permissions.</p> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Updated AOSP versions</th> + </tr> + <tr> + <td>CVE-2017-13312</td> + <td>A-73085795</td> + <td>EoP</td> + <td>High</td> + <td>8.0</td> + </tr> + <tr> + <td>CVE-2017-13313</td> + <td>A-74114680</td> + <td>DoS</td> + <td>High</td> + <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> +</table> + + +<h3 id="system">System</h3> +<p>The most severe vulnerability in this section could enable a local malicious +application to bypass user interaction requirements in order to gain access to +additional permissions.</p> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Updated AOSP versions</th> + </tr> + <tr> + <td>CVE-2017-13314</td> + <td>A-63000005</td> + <td>EoP</td> + <td>High</td> + <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> + <tr> + <td>CVE-2017-13315</td> + <td>A-70721937</td> + <td>EoP</td> + <td>High</td> + <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> +</table> + + +<h2 id="2018-05-05-details">2018-05-05 security patch level vulnerability details</h2> + +<p> +In the sections below, we provide details for each of the security +vulnerabilities that apply to the 2018-05-05 patch level. Vulnerabilities are +grouped under the component that they affect and include details such as the +CVE, associated references, <a href="#type">type of vulnerability</a>, +<a href="/security/overview/updates-resources.html#severity">severity</a>, +component (where applicable), and updated AOSP versions (where applicable). When +available, we link the public change that addressed the issue to the bug ID, +like the AOSP change list. When multiple changes relate to a single bug, +additional references are linked to numbers following the bug ID. +</p> + +<h3 id="kernel-components">Kernel components</h3> +<p>The most severe vulnerability in this section could enable a local malicious +application to bypass operating system protections that isolate application +data from other applications.</p> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Component</th> + </tr> + <tr> + <td>CVE-2017-16643</td> + <td>A-69916367<br /> + <a href="https://github.com/torvalds/linux/commit/a50829479f58416a013a4ccca791336af3c584c7"> +Upstream kernel</a></td> + <td>ID</td> + <td>High</td> + <td>USB driver</td> + </tr> + <tr> + <td>CVE-2017-5754</td> + <td>A-69856074<a href="#asterisk">*</a></td> + <td>ID</td> + <td>High</td> + <td>Memory mapping</td> + </tr> +</table> + + +<h3 id="nvidia-components">NVIDIA components</h3> +<p>The most severe vulnerability in this section could enable a local malicious +application to execute arbitrary code within the context of the TEE.</p> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Component</th> + </tr> + <tr> + <td>CVE-2017-6289</td> + <td>A-72830049<a href="#asterisk">*</a></td> + <td>EoP</td> + <td>Critical</td> + <td>TEE</td> + </tr> + <tr> + <td>CVE-2017-5715</td> + <td>A-71686116<a href="#asterisk">*</a></td> + <td>ID</td> + <td>High</td> + <td>TLK</td> + </tr> + <tr> + <td>CVE-2017-6293</td> + <td>A-69377364<a href="#asterisk">*</a></td> + <td>EoP</td> + <td>High</td> + <td>NVIDIA Tegra X1 TZ</td> + </tr> +</table> + + +<h3 id="qualcomm-components">Qualcomm components</h3> +<p>The most severe vulnerability in this section could enable a proximate +attacker using a specially crafted file to execute arbitrary code within the +context of a privileged process.</p> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Component</th> + </tr> + <tr> + <td>CVE-2018-3580</td> + <td>A-72957507<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=55dcc8d5ae9611e772a7ba572755192cf5415f04"> +QC-CR#2149187</a></td> + <td>RCE</td> + <td>Critical</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-5841</td> + <td>A-72957293<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=c3b82b337b1bbe854d330fc248b389b1ff11c248"> +QC-CR#2073502</a></td> + <td>EoP</td> + <td>High</td> + <td>DCC</td> + </tr> + <tr> + <td>CVE-2018-5850</td> + <td>A-72957135<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=58b04ed29f44a8b49e0fa2f22b2a0ecf87324243"> +QC-CR#2141458</a></td> + <td>EoP</td> + <td>High</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-5846</td> + <td>A-71501683<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=616bb99045d728088b445123dfdff8eadcc27090"> +QC-CR#2120063</a></td> + <td>EoP</td> + <td>High</td> + <td>Radio internet packet accelerator</td> + </tr> + <tr> + <td>CVE-2018-5845</td> + <td>A-71501680<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=a989f5c6398175cc7354b9cdf0424449f8dd9860"> +QC-CR#2119081</a></td> + <td>EoP</td> + <td>High</td> + <td>GPU</td> + </tr> + <tr> + <td>CVE-2018-5840</td> + <td>A-71501678<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=5d1c951ee0e3b06f96736eed25869bbfaf77efbc"> +QC-CR#2052024</a></td> + <td>EoP</td> + <td>High</td> + <td>GPU</td> + </tr> + <tr> + <td>CVE-2017-18154</td> + <td>A-62872238<a href="#asterisk">*</a><br /> + QC-CR#2109325</td> + <td>EoP</td> + <td>High</td> + <td>Libgralloc</td> + </tr> + <tr> + <td>CVE-2018-3578</td> + <td>A-72956999<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=0f22d9370eb848ee751a94a7ff472c335e934890"> +QC-CR#2145573</a></td> + <td>EoP</td> + <td>High</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-3565</td> + <td>A-72957234<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=ab91234d52984a86a836561578c8ab85cf0b5f2f"> +QC-CR#2138555</a></td> + <td>EoP</td> + <td>High</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2017-13077</td> + <td>A-77481464<a href="#asterisk">*</a></td> + <td>EoP</td> + <td>High</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-3562</td> + <td>A-72957526<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=7e82edc9f1ed60fa99dd4da29f91c4ad79470d7e">QC-CR#2147955</a> + [<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=70a5ee609ef6199dfcd8cce6198edc6f48b16bec">2</a>]</td> + <td>DoS</td> + <td>High</td> + <td>WLAN</td> + </tr> +</table> + +<h2 id="common-questions-and-answers">Common questions and answers</h2> +<p> +This section answers common questions that may occur after reading this +bulletin.</p> + +<p><strong>1. How do I determine if my device is updated to address these issues? +</strong></p> +<p>To learn how to check a device's security patch level, see +<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Check +and update your Android version</a>.</p> +<ul> +<li>Security patch levels of 2018-05-01 or later address all issues associated +with the 2018-05-01 security patch level.</li> +<li>Security patch levels of 2018-05-05 or later address all issues associated +with the 2018-05-05 security patch level and all previous patch levels.</li> +</ul> +<p> +Device manufacturers that include these updates should set the patch string +level to: +</p> +<ul> +<li>[ro.build.version.security_patch]:[2018-05-01]</li> +<li>[ro.build.version.security_patch]:[2018-05-05]</li> +</ul> +<p> +<strong>2. Why does this bulletin have two security patch levels?</strong> +</p> +<p> +This bulletin has two security patch levels so that Android partners have the +flexibility to fix a subset of vulnerabilities that are similar across all +Android devices more quickly. Android partners are encouraged to fix all issues +in this bulletin and use the latest security patch level. +</p> +<ul> +<li>Devices that use the 2018-05-01 security patch level must include all issues +associated with that security patch level, as well as fixes for all issues +reported in previous security bulletins.</li> +<li>Devices that use the security patch level of 2018-05-05 or newer must +include all applicable patches in this (and previous) security +bulletins.</li> +</ul> +<p> +Partners are encouraged to bundle the fixes for all issues they are addressing +in a single update. +</p> +<p id="type"> +<strong>3. What do the entries in the <em>Type</em> column mean?</strong> +</p> +<p> +Entries in the <em>Type</em> column of the vulnerability details table reference +the classification of the security vulnerability. +</p> +<table> + <col width="25%"> + <col width="75%"> + <tr> + <th>Abbreviation</th> + <th>Definition</th> + </tr> + <tr> + <td>RCE</td> + <td>Remote code execution</td> + </tr> + <tr> + <td>EoP</td> + <td>Elevation of privilege</td> + </tr> + <tr> + <td>ID</td> + <td>Information disclosure</td> + </tr> + <tr> + <td>DoS</td> + <td>Denial of service</td> + </tr> + <tr> + <td>N/A</td> + <td>Classification not available</td> + </tr> +</table> +<p> +<strong>4. What do the entries in the <em>References</em> column mean?</strong> +</p> +<p> +Entries under the <em>References</em> column of the vulnerability details table +may contain a prefix identifying the organization to which the reference value +belongs. +</p> +<table> + <col width="25%"> + <col width="75%"> + <tr> + <th>Prefix</th> + <th>Reference</th> + </tr> + <tr> + <td>A-</td> + <td>Android bug ID</td> + </tr> + <tr> + <td>QC-</td> + <td>Qualcomm reference number</td> + </tr> + <tr> + <td>M-</td> + <td>MediaTek reference number</td> + </tr> + <tr> + <td>N-</td> + <td>NVIDIA reference number</td> + </tr> + <tr> + <td>B-</td> + <td>Broadcom reference number</td> + </tr> +</table> +<p id="asterisk"> +<strong>5. What does a * next to the Android bug ID in the <em>References</em> +column mean?</strong> +</p> +<p> +Issues that are not publicly available have a * next to the Android bug ID in +the <em>References</em> column. The update for that issue is generally contained +in the latest binary drivers for Nexus devices available from the <a +href="https://developers.google.com/android/nexus/drivers">Google Developer +site</a>. +</p> +<p> +<strong>6. Why are security vulnerabilities split between this bulletin and +device/partner security bulletins, such as the Pixel / Nexus bulletin?</strong> +</p> +<p> +Security vulnerabilities that are documented in this security bulletin are +required in order to declare the latest security patch level on Android devices. +Additional security vulnerabilities that are documented in the +device / partner security bulletins are not required for declaring +a security patch level. Android device and chipset manufacturers are encouraged +to document the presence of other fixes on their devices through their own security +websites, such as the +<a href="https://security.samsungmobile.com/securityUpdate.smsb">Samsung</a>, +<a href="https://lgsecurity.lge.com/security_updates.html">LGE</a>, or +<a href="/security/bulletin/pixel/">Pixel / Nexus</a> +security bulletins. +</p> +<h2 id="versions">Versions</h2> +<table> + <col width="25%"> + <col width="25%"> + <col width="50%"> + <tr> + <th>Version</th> + <th>Date</th> + <th>Notes</th> + </tr> + <tr> + <td>1.0</td> + <td>May 7, 2018</td> + <td>Bulletin published.</td> + </tr> +</table> +</body> +</html> diff --git a/en/security/bulletin/2018.html b/en/security/bulletin/2018.html index 58c206cc..ec4bfbad 100644 --- a/en/security/bulletin/2018.html +++ b/en/security/bulletin/2018.html @@ -37,6 +37,22 @@ of all bulletins, see the <a href="/security/bulletin/index.html">Android Securi <th>Security patch level</th> </tr> <tr> + <td><a href="/security/bulletin/2018-05-01.html">May 2018</a></td> + <td>Coming soon + <!-- + <a href="/security/bulletin/2018-05-01.html">English</a> / + <a href="/security/bulletin/2018-05-01.html?hl=ja">日本語</a> / + <a href="/security/bulletin/2018-05-01.html?hl=ko">한국어</a> / + <a href="/security/bulletin/2018-05-01.html?hl=ru">ру́сский</a> / + <a href="/security/bulletin/2018-05-01.html?hl=zh-cn">中文 (中国)</a> / + <a href="/security/bulletin/2018-05-01.html?hl=zh-tw">中文 (台灣)</a> + --> + </td> + <td>May 7, 2018</td> + <td>2018-05-01<br> + 2018-05-05</td> + </tr> + <tr> <td><a href="/security/bulletin/2018-04-01.html">April 2018</a></td> <td>Coming soon <!-- @@ -49,19 +65,18 @@ of all bulletins, see the <a href="/security/bulletin/index.html">Android Securi --> </td> <td>April 2, 2018</td> - <td>2018-04-05</td> + <td>2018-04-01<br> + 2018-04-05</td> </tr> <tr> <td><a href="/security/bulletin/2018-03-01.html">March 2018</a></td> - <td>Coming soon - <!-- + <td> <a href="/security/bulletin/2018-03-01.html">English</a> / <a href="/security/bulletin/2018-03-01.html?hl=ja">日本語</a> / <a href="/security/bulletin/2018-03-01.html?hl=ko">한국어</a> / <a href="/security/bulletin/2018-03-01.html?hl=ru">ру́сский</a> / <a href="/security/bulletin/2018-03-01.html?hl=zh-cn">中文 (中国)</a> / <a href="/security/bulletin/2018-03-01.html?hl=zh-tw">中文 (台灣)</a> - --> </td> <td>March 2018</td> <td>2018-03-01<br> diff --git a/en/security/bulletin/_translation.yaml b/en/security/bulletin/_translation.yaml index af2c6b7f..37f58a17 100644 --- a/en/security/bulletin/_translation.yaml +++ b/en/security/bulletin/_translation.yaml @@ -31,6 +31,10 @@ ignore_paths: - /security/bulletin/2015-10-01 - /security/bulletin/2015-09-01 - /security/bulletin/2015-08-01 +- /security/bulletin/pixel/2017 +- /security/bulletin/pixel/2017-12-01 +- /security/bulletin/pixel/2017-11-01 +- /security/bulletin/pixel/2017-10-01 enable_continuous_translation: True title: Android Security Bulletins description: Translations for Android Security Bulletins diff --git a/en/security/bulletin/index.html b/en/security/bulletin/index.html index b4bac017..7761d8fd 100644 --- a/en/security/bulletin/index.html +++ b/en/security/bulletin/index.html @@ -68,6 +68,22 @@ Android Open Source Project (AOSP), the upstream Linux kernel, and system-on-chi <th>Security patch level</th> </tr> <tr> + <td><a href="/security/bulletin/2018-05-01.html">May 2018</a></td> + <td>Coming soon + <!-- + <a href="/security/bulletin/2018-05-01.html">English</a> / + <a href="/security/bulletin/2018-05-01.html?hl=ja">日本語</a> / + <a href="/security/bulletin/2018-05-01.html?hl=ko">한국어</a> / + <a href="/security/bulletin/2018-05-01.html?hl=ru">ру́сский</a> / + <a href="/security/bulletin/2018-05-01.html?hl=zh-cn">中文 (中国)</a> / + <a href="/security/bulletin/2018-05-01.html?hl=zh-tw">中文 (台灣)</a> + --> + </td> + <td>May 7, 2018</td> + <td>2018-05-01<br> + 2018-05-05</td> + </tr> + <tr> <td><a href="/security/bulletin/2018-04-01.html">April 2018</a></td> <td>Coming soon <!-- @@ -80,19 +96,18 @@ Android Open Source Project (AOSP), the upstream Linux kernel, and system-on-chi --> </td> <td>April 2, 2018</td> - <td>2018-04-05</td> + <td>2018-04-01<br> + 2018-04-05</td> </tr> <tr> <td><a href="/security/bulletin/2018-03-01.html">March 2018</a></td> - <td>Coming soon - <!-- + <td> <a href="/security/bulletin/2018-03-01.html">English</a> / <a href="/security/bulletin/2018-03-01.html?hl=ja">日本語</a> / <a href="/security/bulletin/2018-03-01.html?hl=ko">한국어</a> / <a href="/security/bulletin/2018-03-01.html?hl=ru">ру́сский</a> / <a href="/security/bulletin/2018-03-01.html?hl=zh-cn">中文 (中国)</a> / <a href="/security/bulletin/2018-03-01.html?hl=zh-tw">中文 (台灣)</a> - --> </td> <td>March 5, 2018</td> <td>2018-03-01<br> diff --git a/en/security/bulletin/pixel/2018-05-01.html b/en/security/bulletin/pixel/2018-05-01.html new file mode 100644 index 00000000..2532c0af --- /dev/null +++ b/en/security/bulletin/pixel/2018-05-01.html @@ -0,0 +1,619 @@ +<html devsite> + <head> + <title>Pixel / Nexus Security Bulletin—May 2018</title> + <meta name="project_path" value="/_project.yaml" /> + <meta name="book_path" value="/_book.yaml" /> + </head> + <body> + <!-- + Copyright 2018 The Android Open Source Project + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + //www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. + --> + +<p><em>Published May 7, 2018</em></p> + +<p> +The Pixel / Nexus Security Bulletin contains details of security +vulnerabilities and functional improvements affecting +<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">supported +Google Pixel and Nexus devices</a> (Google devices). +For Google devices, security patch levels of 2018-05-05 or later address all +issues in this bulletin and all issues in the May 2018 Android Security +Bulletin. To learn how to check a device's security patch level, see +<a href="https://support.google.com/pixelphone/answer/4457705">Check & update your +Android version</a>. +</p> +<p> +All supported Google devices will receive an update to the 2018-05-05 patch +level. We encourage all customers to accept these updates to their devices. +</p> +<p class="note"> +<strong>Note:</strong> The Google device firmware images are available on the +<a href="https://developers.google.com/android/nexus/images">Google Developer +site</a>. +</p> +<h2 id="announcements">Announcements</h2> +<p>In addition to the security vulnerabilities described in the May 2018 +Android Security Bulletin, Pixel and Nexus devices also contain patches for the +security vulnerabilities described below. Partners were notified of these issues +at least a month ago and may choose to incorporate them as part of their device +updates.</p> +<h2 id="security-patches">Security patches</h2> +<p> +Vulnerabilities are grouped under the component that they affect. There is a +description of the issue and a table with the CVE, associated references, +<a href="#type">type of vulnerability</a>, +<a href="https://source.android.com/security/overview/updates-resources.html#severity">severity</a>, +and updated Android Open Source Project (AOSP) versions (where applicable). When +available, we link the public change that addressed the issue to the bug ID, +like the AOSP change list. When multiple changes relate to a single bug, +additional references are linked to numbers following the bug ID. +</p> + +<h3 id="framework">Framework</h3> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Updated AOSP versions</th> + </tr> + <tr> + <td>CVE-2017-13316</td> + <td>A-73311729</td> + <td>ID</td> + <td>Moderate</td> + <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> +</table> + +<h3 id="media-framework">Media framework</h3> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Updated AOSP versions</th> + </tr> + <tr> + <td>CVE-2017-13317</td> + <td>A-73172046</td> + <td>ID</td> + <td>Moderate</td> + <td>8.1</td> + </tr> + <tr> + <td>CVE-2017-13318</td> + <td>A-73782357</td> + <td>ID</td> + <td>Moderate</td> + <td>8.1</td> + </tr> + <tr> + <td rowspan="2">CVE-2017-13319</td> + <td rowspan="2">A-71868329</td> + <td>ID</td> + <td>Moderate</td> + <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> + <tr> + <td>DoS</td> + <td>High</td> + <td>6.0, 6.0.1</td> + </tr> + <tr> + <td rowspan="2">CVE-2017-13320</td> + <td rowspan="2">A-72764648</td> + <td>ID</td> + <td>Moderate</td> + <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> + <tr> + <td>DoS</td> + <td>High</td> + <td>6.0, 6.0.1</td> + </tr> +</table> + +<h3 id="system">System</h3> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Updated AOSP versions</th> + </tr> + <tr> + <td>CVE-2017-13323</td> + <td>A-73826242</td> + <td>EoP</td> + <td>Moderate</td> + <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> + <tr> + <td>CVE-2017-13321</td> + <td>A-70986337</td> + <td>ID</td> + <td>Moderate</td> + <td>8.0, 8.1</td> + </tr> + <tr> + <td>CVE-2017-13322</td> + <td>A-67862398</td> + <td>DoS</td> + <td>Moderate</td> + <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> +</table> + +<h3 id="kernel-components">Kernel components</h3> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Component</th> + </tr> + <tr> + <td>CVE-2018-5344</td> + <td>A-72867809<br /> + <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5"> +Upstream kernel</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>Block driver</td> + </tr> + <tr> + <td>CVE-2017-15129</td> + <td>A-72961054<br /> + <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=21b5944350052d2583e82dd59b19a9ba94a007f0"> +Upstream kernel</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>Network namespace</td> + </tr> +</table> + +<h3 id="nvidia-components">NVIDIA components</h3> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Component</th> + </tr> + <tr> + <td>CVE-2018-6254</td> + <td>A-64340684<a href="#asterisk">*</a></td> + <td>ID</td> + <td>Moderate</td> + <td>Media server</td> + </tr> + <tr> + <td>CVE-2018-6246</td> + <td>A-69383916<a href="#asterisk">*</a></td> + <td>ID</td> + <td>Moderate</td> + <td>Widevine trustlet</td> + </tr> +</table> + + +<h3 id="qualcomm-components">Qualcomm components</h3> + + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Component</th> + </tr> + <tr> + <td>CVE-2018-5849</td> + <td>A-72957611<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=b17c33ea2dafc8fd11b5050d750fefe0b53f226b"> +QC-CR#2131811</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>QTEECOM</td> + </tr> + <tr> + <td>CVE-2018-5851</td> + <td>A-72957505<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=103f385783f368cc5cd3c125390e6dfd43c36096">QC-CR#2146869</a> +[<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a9068fbb6bad55c9ecc80b9c3935969c8820c425">2</a>]</td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-5842</td> + <td>A-72957257<br /> + <a +href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=f05883b3d442a7eb9df46a6bde08f1d5cdfc8133">QC-CR#2113219</a> +[<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=21b91d4faa275d7b1ae58ad6a549cfa801066dfe">2</a>]</td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-5848</td> + <td>A-72957178<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=6e5a9b32503d37a202fccc5d24b189ae6107a256"> +QC-CR#2126062</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>WIGIG</td> + </tr> + <tr> + <td>CVE-2018-5853</td> + <td>A-71714212<a href="#asterisk">*</a><br /> + QC-CR#2178082<br /> + QC-CR#2043277</td> + <td>EoP</td> + <td>Moderate</td> + <td>Networking subsystem</td> + </tr> + <tr> + <td>CVE-2018-5843</td> + <td>A-71501685<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=ea4459a044783649b1695653f848647c68bee69d"> +QC-CR#2113385</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>Modem driver</td> + </tr> + <tr> + <td>CVE-2018-5844</td> + <td>A-71501682<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=f8ed842bb3f4620eafa2669e0f534ce4c3ac6f07"> +QC-CR#2118860</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>Video device</td> + </tr> + <tr> + <td>CVE-2018-5847</td> + <td>A-71501681<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=3ddf48ce0377d71c86ff09d199f0307dad39fdd5"> +QC-CR#2120955</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>Snapdragon display engine</td> + </tr> + <tr> + <td>CVE-2018-3582</td> + <td>A-72956801<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=db5ee07b422f0d49ecf992b0b050c9266b0eb8e7"> +QC-CR#2149531</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-3581</td> + <td>A-72957725<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=becb9c5aaa05137ce1002f77f8a7d9e7e0799268">QC-CR#2150359</a> + [<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=43c8a7f083c56b2f6aeac6d77721f5a70bdba99c">2</a>]</td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-3576</td> + <td>A-72957337<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=bdf6936cd49a1e43184c7ff1635126fca946a995"> +QC-CR#2128512</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-3572</td> + <td>A-72957724<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=b11e3a50197e73e397c36d335d56d905b99eb02c">QC-CR#2145996</a> + [<a href="https://source.codeaurora.org/quic/la/platform/vendor/opensource/audio-kernel/commit/?id=fbf66aa0c6ae84db64bdf0b8f3c3a32370c70c67">2</a>]</td> + <td>EoP</td> + <td>Moderate</td> + <td>Audio</td> + </tr> + <tr> + <td>CVE-2018-3571</td> + <td>A-72957527<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=db41c9cc35d82238a4629e5ff29ba0c6b80b2cd6"> +QC-CR#2132332</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>Kgsl</td> + </tr> + <tr> + <td>CVE-2017-18153</td> + <td>A-35470735<a href="#asterisk">*</a><br /> + QC-CR#2021363</td> + <td>EoP</td> + <td>Moderate</td> + <td>Qcacld-2.0</td> + </tr> + <tr> + <td>CVE-2017-18070</td> + <td>A-72441280<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=dc6c24b0a660d643c90a9cede1be4bdd44509b3e"> +QC-CR#2114348</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2017-15857</td> + <td>A-65122765<a href="#asterisk">*</a><br /> + QC-CR#2111672<br /> + QC-CR#2152401<br /> + QC-CR#2152399<br /> + QC-CR#2153841</td> + <td>EoP</td> + <td>Moderate</td> + <td>Camera</td> + </tr> + <tr> + <td>CVE-2017-15854</td> + <td>A-71501688<br /> + <a href=" https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=aef5f626a7454844cc695a827cb87f89b37501e7"> +QC-CR#2114396</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2017-15843</td> + <td>A-72956941<br /> + <a +href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=a549abd08f3a52593d9602128c63c1212e90984b">QC-CR#2032076</a> +[<a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=e05adec18cbc3c9213cc293441a2be8683339b4a">2</a>]</td> + <td>EoP</td> + <td>Moderate</td> + <td>Floor_vote driver</td> + </tr> + <tr> + <td>CVE-2017-15842</td> + <td>A-72957040<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c4ab75dfc22f644fb5ee70bd515aaf633761cd3b">QC-CR#2123291</a> + [<a href="https://source.codeaurora.org/quic/la/platform/vendor/opensource/audio-kernel/commit/?id=6d42b0e51ed7f8e51397d89af66c1453beba51cd">2</a>]</td> + <td>EoP</td> + <td>Moderate</td> + <td>Qdsp6v2</td> + </tr> + <tr> + <td>CVE-2017-15832</td> + <td>A-70237689<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=2b087bc5d5bdc18f9bc75148bd8b176a676b910a"> +QC-CR#2114756</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-5852</td> + <td>A-70242505<a href="#asterisk">*</a><br /> + QC-CR#2169379</td> + <td>ID</td> + <td>Moderate</td> + <td>Ipa driver</td> + </tr> + <tr> + <td>CVE-2018-3579</td> + <td>A-72957564<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=c2ce7b9c46d24a30901a402f3d4892b905b7d8e8"> +QC-CR#2149720</a></td> + <td>ID</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> +</table> + +<h2 id="functional-patches">Functional patches</h2> +<p> +These updates are included for affected Pixel devices to address functionality +issues not related to the security of Pixel devices. The table includes +associated references; the affected category, such as Bluetooth or mobile data; +and a summary of the issue. +</p> +<table> + <tr> + <th>References</th> + <th>Category</th> + <th>Improvements</th> + <th>Devices</th> + </tr> + <tr> + <td>A-68840121</td> + <td>Performance</td> + <td>Improve Multitouch Detection</td> + <td>All</td> + </tr> + <tr> + <td>A-72851087</td> + <td>Power</td> + <td>Adjust Pixel XL charging behavior</td> + <td>Pixel XL</td> + </tr> +</table> + +<h2 id="common-questions-and-answers">Common questions and answers</h2> +<p> +This section answers common questions that may occur after reading this +bulletin. +</p> +<p> +<strong>1. How do I determine if my device is updated to address these issues? +</strong> +</p> +<p> +Security patch levels of 2018-05-05 or later address all issues associated with +the 2018-05-05 security patch level and all previous patch levels. To learn how +to check a device's security patch level, read the instructions on the <a +href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel +and Nexus update schedule</a>. +</p> +<p id="type"> +<strong>2. What do the entries in the <em>Type</em> column mean?</strong> +</p> +<p> +Entries in the <em>Type</em> column of the vulnerability details table reference +the classification of the security vulnerability. +</p> +<table> + <col width="25%"> + <col width="75%"> + <tr> + <th>Abbreviation</th> + <th>Definition</th> + </tr> + <tr> + <td>RCE</td> + <td>Remote code execution</td> + </tr> + <tr> + <td>EoP</td> + <td>Elevation of privilege</td> + </tr> + <tr> + <td>ID</td> + <td>Information disclosure</td> + </tr> + <tr> + <td>DoS</td> + <td>Denial of service</td> + </tr> + <tr> + <td>N/A</td> + <td>Classification not available</td> + </tr> +</table> +<p> +<strong>3. What do the entries in the <em>References</em> column mean?</strong> +</p> +<p> +Entries under the <em>References</em> column of the vulnerability details table +may contain a prefix identifying the organization to which the reference value +belongs. +</p> +<table> + <col width="25%"> + <col width="75%"> + <tr> + <th>Prefix</th> + <th>Reference</th> + </tr> + <tr> + <td>A-</td> + <td>Android bug ID</td> + </tr> + <tr> + <td>QC-</td> + <td>Qualcomm reference number</td> + </tr> + <tr> + <td>M-</td> + <td>MediaTek reference number</td> + </tr> + <tr> + <td>N-</td> + <td>NVIDIA reference number</td> + </tr> + <tr> + <td>B-</td> + <td>Broadcom reference number</td> + </tr> +</table> +<p id="asterisk"> +<strong>4. What does a * next to the Android bug ID in the <em>References</em> +column mean?</strong> +</p> +<p> +Issues that are not publicly available have a * next to the Android bug ID in +the <em>References</em> column. The update for that issue is generally contained +in the latest binary drivers for Nexus devices available from the +<a href="https://developers.google.com/android/nexus/drivers">Google Developer site</a>. +</p> +<p> +<strong>5. Why are security vulnerabilities split between this bulletin and the +Android Security Bulletins?</strong> +</p> +<p> +Security vulnerabilities that are documented in the Android Security Bulletins +are required in order to declare the latest security patch level on Android +devices. Additional security vulnerabilities, such as those documented in this +bulletin are not required for declaring a security patch level. +</p> +<h2 id="versions">Versions</h2> +<table> + <col width="25%"> + <col width="25%"> + <col width="50%"> + <tr> + <th>Version</th> + <th>Date</th> + <th>Notes</th> + </tr> + <tr> + <td>1.0</td> + <td>May 7, 2018</td> + <td>Bulletin published.</td> + </tr> +</table> + + </body> +</html> diff --git a/en/security/bulletin/pixel/2018.html b/en/security/bulletin/pixel/2018.html index f4a08522..a2597f50 100644 --- a/en/security/bulletin/pixel/2018.html +++ b/en/security/bulletin/pixel/2018.html @@ -39,6 +39,21 @@ Bulletins</a> homepage.</p> <th>Security patch level</th> </tr> <tr> + <td><a href="/security/bulletin/pixel/2018-05-01.html">May 2018</a></td> + <td>Coming soon + <!-- + <a href="/security/bulletin/pixel/2018-05-01.html">English</a> / + <a href="/security/bulletin/pixel/2018-05-01.html?hl=ja">日本語</a> / + <a href="/security/bulletin/pixel/2018-05-01.html?hl=ko">한국어</a> / + <a href="/security/bulletin/pixel/2018-05-01.html?hl=ru">ру́сский</a> / + <a href="/security/bulletin/pixel/2018-05-01.html?hl=zh-cn">中文 (中国)</a> / + <a href="/security/bulletin/pixel/2018-05-01.html?hl=zh-tw">中文 (台灣)</a> + --> + </td> + <td>May 7, 2018</td> + <td>2018-05-05</td> + </tr> + <tr> <td><a href="/security/bulletin/pixel/2018-04-01.html">April 2018</a></td> <td>Coming soon <!-- @@ -50,20 +65,20 @@ Bulletins</a> homepage.</p> <a href="/security/bulletin/pixel/2018-04-01.html?hl=zh-tw">中文 (台灣)</a> --> </td> - <td>April 2018</td> + <td>April 2, 2018</td> <td>2018-04-05</td> </tr> <tr> <td><a href="/security/bulletin/pixel/2018-03-01.html">March 2018</a></td> - <td>Coming soon - <!-- + <td> <a href="/security/bulletin/pixel/2018-03-01.html">English</a> / <a href="/security/bulletin/pixel/2018-03-01.html?hl=ja">日本語</a> / <a href="/security/bulletin/pixel/2018-03-01.html?hl=ko">한국어</a> / <a href="/security/bulletin/pixel/2018-03-01.html?hl=ru">ру́сский</a> / + <!-- <a href="/security/bulletin/pixel/2018-03-01.html?hl=zh-cn">中文 (中国)</a> / - <a href="/security/bulletin/pixel/2018-03-01.html?hl=zh-tw">中文 (台灣)</a> --> + <a href="/security/bulletin/pixel/2018-03-01.html?hl=zh-tw">中文 (台灣)</a> </td> <td>March 2018</td> <td>2018-03-05</td> diff --git a/en/security/bulletin/pixel/index.html b/en/security/bulletin/pixel/index.html index 95f1eafd..73e6d0f7 100644 --- a/en/security/bulletin/pixel/index.html +++ b/en/security/bulletin/pixel/index.html @@ -24,7 +24,7 @@ <p>This page contains the available Pixel / Nexus monthly bulletins. These bulletins supplement the -<a href="/security/bulletin">Android Security Bulletins</a> with +<a href="/security/bulletin">Android Security Bulletins</a> with additional security patches and functional improvements on Pixel and Nexus devices. These bulletins apply to <a href="https://support.google.com/nexus/answer/4457705">supported Pixel and @@ -59,6 +59,21 @@ AOSP 24–48 hours after the Pixel / Nexus bulletin is release <th>Security patch level</th> </tr> <tr> + <td><a href="/security/bulletin/pixel/2018-05-01.html">May 2018</a></td> + <td>Coming soon + <!-- + <a href="/security/bulletin/pixel/2018-05-01.html">English</a> / + <a href="/security/bulletin/pixel/2018-05-01.html?hl=ja">日本語</a> / + <a href="/security/bulletin/pixel/2018-05-01.html?hl=ko">한국어</a> / + <a href="/security/bulletin/pixel/2018-05-01.html?hl=ru">ру́сский</a> / + <a href="/security/bulletin/pixel/2018-05-01.html?hl=zh-cn">中文 (中国)</a> / + <a href="/security/bulletin/pixel/2018-05-01.html?hl=zh-tw">中文 (台灣)</a> + --> + </td> + <td>May 7, 2018</td> + <td>2018-05-05</td> + </tr> + <tr> <td><a href="/security/bulletin/pixel/2018-04-01.html">April 2018</a></td> <td>Coming soon <!-- @@ -70,20 +85,20 @@ AOSP 24–48 hours after the Pixel / Nexus bulletin is release <a href="/security/bulletin/pixel/2018-04-01.html?hl=zh-tw">中文 (台灣)</a> --> </td> - <td>April 2018</td> + <td>April 2, 2018</td> <td>2018-04-05</td> </tr> <tr> <td><a href="/security/bulletin/pixel/2018-03-01.html">March 2018</a></td> - <td>Coming soon - <!-- + <td> <a href="/security/bulletin/pixel/2018-03-01.html">English</a> / <a href="/security/bulletin/pixel/2018-03-01.html?hl=ja">日本語</a> / <a href="/security/bulletin/pixel/2018-03-01.html?hl=ko">한국어</a> / <a href="/security/bulletin/pixel/2018-03-01.html?hl=ru">ру́сский</a> / + <!-- <a href="/security/bulletin/pixel/2018-03-01.html?hl=zh-cn">中文 (中国)</a> / - <a href="/security/bulletin/pixel/2018-03-01.html?hl=zh-tw">中文 (台灣)</a> --> + <a href="/security/bulletin/pixel/2018-03-01.html?hl=zh-tw">中文 (台灣)</a> </td> <td>March 5, 2018</td> <td>2018-03-05</td> diff --git a/en/security/overview/acknowledgements.html b/en/security/overview/acknowledgements.html index bd66f9dc..e621c0a9 100644 --- a/en/security/overview/acknowledgements.html +++ b/en/security/overview/acknowledgements.html @@ -37,6 +37,59 @@ Rewards</a> program.</p> <p>In 2018, the security acknowledgements are listed by month. In prior years, acknowledgements were listed together.</p> +<h4 id="may-2018">May</h4> +<table> + <col width="70%"> + <col width="30%"> + <tr> + <th>Researchers</th> + <th>CVEs</th> + </tr> + <tr> + <td>Corinna Vinschen</td> + <td>CVE-2018-5853</td> + </tr> + <tr> + <td>derrek (<a href="https://twitter.com/derrekr6">@derrekr6</a>)</td> + <td>CVE-2017-6293, CVE-2018-6246</td> + </tr> + <tr> + <td>Gengjia Chen (<a href="https://twitter.com/chengjia4574">@chengjia4574</a>) and + <a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360 Technology Co. Ltd.</td> + <td>CVE-2017-18153</td> + </tr> + <tr> + <td><a href="mailto:arnow117@gmail.com">Hanxiang Wen</a> and Mingjian Zhou (周明建) + (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of + <a href="http://c0reteam.org">C0RE</a> Team</td> + <td>CVE-2017-18154</td> + </tr> + <tr> + <td>Hongli Han (<a href="https://twitter.com/HexB1n">@HexB1n</a>) and Mingjian Zhou (周明建) + (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of + <a href="http://c0reteam.org">C0RE Team</a></td> + <td>CVE-2018-6254</td> + </tr> + <tr> + <td>Joshua Steiner of Introne Apps</td> + <td>CVE-2017-13322</td> + </tr> + <tr> + <td><a href="https://github.com/michalbednarski">Michał Bednarski</a></td> + <td>CVE-2017-13310, CVE-2017-13311</td> + </tr> + <tr> + <td>Pengfei Ding (丁鹏飞), Chenfu Bao (包沉浮), and Lenx Wei (韦韬) of Baidu X-Lab (百度安全实验室)</td> + <td>CVE-2017-15857, CVE-2018-5852</td> + </tr> + <tr> + <td><a href="http://weibo.com/ele7enxxh">Zinuo Han</a> of Chengdu Security Response Center, + Qihoo 360 Technology Co. Ltd</td> + <td>CVE-2017-13321, CVE-2017-13315, CVE-2017-13318, CVE-2017-13323, CVE-2017-13312, + CVE-2017-13319, CVE-2017-13317</td> + </tr> +</table> + <h4 id="apr-2018">April</h4> @@ -81,7 +134,7 @@ acknowledgements were listed together.</p> </td> </tr> <tr> - <td>Dinesh Venkatesan (<a href="https://twitter.com/malwareresearch">@malwareresearch</a>) of + <td>Dinesh Venkatesan (<a href="https://twitter.com/malwareresearch">@malwareresearch</a>) of Symantec </td> <td>CVE-2017-13295 @@ -94,14 +147,14 @@ acknowledgements were listed together.</p> </td> </tr> <tr> - <td>En He (<a href="https://twitter.com/heeeeen4x">@heeeeen4x</a>) and Bo Liu of + <td>En He (<a href="https://twitter.com/heeeeen4x">@heeeeen4x</a>) and Bo Liu of <a href="http://www.ms509.com">MS509Team</a> </td> <td>CVE-2017-13294 </td> </tr> <tr> - <td>Eric Leong (<a href="https://twitter.com/ericwleong">@ericwleong</a>) + <td>Eric Leong (<a href="https://twitter.com/ericwleong">@ericwleong</a>) </td> <td>CVE-2017-13301 </td> @@ -113,26 +166,26 @@ acknowledgements were listed together.</p> </td> </tr> <tr> - <td>Haosheng Wang (<a href="https://twitter.com/gnehsoah">@gnehsoah</a>) + <td>Haosheng Wang (<a href="https://twitter.com/gnehsoah">@gnehsoah</a>) </td> <td>CVE-2017-13280 </td> </tr> <tr> - <td>Jean-Baptiste Cayrou (<a href="https://twitter.com/jbcayrou">@jbcayrou</a>) + <td>Jean-Baptiste Cayrou (<a href="https://twitter.com/jbcayrou">@jbcayrou</a>) </td> <td>CVE-2017-13284 </td> </tr> <tr> - <td>Jianjun Dai (<a href="https://twitter.com/Jioun_dai">@Jioun_dai</a>) and Guang Gong of Alpha + <td>Jianjun Dai (<a href="https://twitter.com/Jioun_dai">@Jioun_dai</a>) and Guang Gong of Alpha Team, Qihoo 360 Technology Co. Ltd </td> <td>CVE-2017-13291, CVE-2017-13283, CVE-2017-13282, CVE-2017-13281, CVE-2017-13267 </td> </tr> <tr> - <td>Patrick Delvenne (<a href="https://twitter.com/wintzx">@wintzx</a>) of Orange Labs + <td>Patrick Delvenne (<a href="https://twitter.com/wintzx">@wintzx</a>) of Orange Labs </td> <td>CVE-2018-3584 </td> @@ -156,7 +209,7 @@ acknowledgements were listed together.</p> </td> </tr> <tr> - <td>Weichao Sun of Alibaba Inc (<a href="https://twitter.com/sunblate">@sunblate</a>) + <td>Weichao Sun of Alibaba Inc (<a href="https://twitter.com/sunblate">@sunblate</a>) </td> <td>CVE-2017-13277 </td> @@ -169,7 +222,7 @@ acknowledgements were listed together.</p> </td> </tr> <tr> - <td>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of IceSword Lab, + <td>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of IceSword Lab, Qihoo 360 Technology Co. Ltd </td> <td>CVE-2017-8269, CVE-2017-13307, CVE-2018-5826 @@ -222,7 +275,7 @@ Zhou (周明建)</td> <td>CVE-2018-3560</td> </tr> <tr> - <td>Jianjun Dai (<a href="https://twitter.com/jioun_dai">@Jioun_dai</a>) and + <td>Jianjun Dai (<a href="https://twitter.com/jioun_dai">@Jioun_dai</a>) and Guang Gong of Alpha Team, Qihoo 360 Technology Co. Ltd.</td> <td>CVE-2017-13266, CVE-2017-13256, CVE-2017-13255</td> </tr> @@ -231,16 +284,16 @@ Guang Gong of Alpha Team, Qihoo 360 Technology Co. Ltd.</td> <td>CVE-2017-13258</td> </tr> <tr> - <td>Hongli Han (<a href="https://twitter.com/hexb1n">@hexb1n</a>), <a + <td>Hongli Han (<a href="https://twitter.com/hexb1n">@hexb1n</a>), <a href="mailto:shaodacheng2016@gmail.com">Dacheng Shao</a>, and Mingjian Zhou -(周明建) (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a +(周明建) (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a href="http://c0reteam.org">C0RE Team</a></td> <td>CVE-2017-6287</td> </tr> <tr> - <td>Hongli Han (<a href="https://twitter.com/HexB1n">@HexB1n</a>) and + <td>Hongli Han (<a href="https://twitter.com/HexB1n">@HexB1n</a>) and Mingjian Zhou (周明建)(<a -href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a +href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a href="http://c0reteam.org">C0RE Team</a></td> <td>CVE-2017-6286, CVE-2017-6285, CVE-2017-6281</td> </tr> @@ -256,7 +309,7 @@ CVE-2017-15814</td> </tr> <tr> <td>Tamir Zahavi-Brunner (<a -href="https://twitter.com/tamir_zb">@tamir_zb</a>) of Zimperium zLabs Team</td> +href="https://twitter.com/tamir_zb">@tamir_zb</a>) of Zimperium zLabs Team</td> <td>CVE-2017-13253</td> </tr> <tr> @@ -264,7 +317,7 @@ href="https://twitter.com/tamir_zb">@tamir_zb</a>) of Zimperium zLabs Team</td> <td>CVE-2017-13249, CVE-2017-13248, CVE-2017-13264</td> </tr> <tr> - <td>Wish Wu (<a href=" https://twitter.com/wish_wu">@wish_wu</a> <a + <td>Wish Wu (<a href=" https://twitter.com/wish_wu">@wish_wu</a> <a href="http://www.weibo.com/wishlinux">吴潍浠</a> 此彼) of Ant-financial Light-Year Security Lab</td> <td>CVE-2017-13259, CVE-2017-13272</td> @@ -274,7 +327,7 @@ Security Lab</td> <td>CVE-2017-13257, CVE-2017-13268</td> </tr> <tr> - <td>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of + <td>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of IceSword Lab, Qihoo 360 Technology Co. Ltd.</td> <td>CVE-2017-13271</td> </tr> @@ -300,8 +353,8 @@ Response Center of Qihoo 360 Technology Co. Ltd.</td> </tr> <tr> <td>Aaron Willey, autoprime (<a -href="https://twitter.com/utoprime?lang=en">@utoprime</a>), and Tyler Montgomery -(<a href="https://twitter.com/tylerfixer">@tylerfixer</a>) of Team Codefire +href="https://twitter.com/utoprime?lang=en">@utoprime</a>), and Tyler Montgomery +(<a href="https://twitter.com/tylerfixer">@tylerfixer</a>) of Team Codefire </td> <td>CVE-2017-13238 </td> @@ -320,7 +373,7 @@ Alpha Team, Qihoo 360 Technology Co. Ltd. </td> </tr> <tr> - <td>En He (<a href="https://twitter.com/heeeeen4x">@heeeeen4x</a>) and Bo Liu + <td>En He (<a href="https://twitter.com/heeeeen4x">@heeeeen4x</a>) and Bo Liu of <a href="http://www.ms509.com">MS509Team</a> </td> <td>CVE-2017-13242 @@ -339,17 +392,17 @@ of <a href="http://www.ms509.com">MS509Team</a> </td> </tr> <tr> - <td>Hongli Han (<a href="https://twitter.com/HexB1n">@HexB1n</a>), <a + <td>Hongli Han (<a href="https://twitter.com/HexB1n">@HexB1n</a>), <a href="mailto:shaodacheng2016@gmail.com">Dacheng Shao</a> and Mingjian Zhou (<a -href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a +href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a href="http://c0reteam.org">C0RE Team</a> </td> <td>CVE-2017-6258 </td> </tr> <tr> - <td>Hongli Han (<a href="https://twitter.com/HexB1n">@HexB1n</a>), Mingjian -Zhou (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a + <td>Hongli Han (<a href="https://twitter.com/HexB1n">@HexB1n</a>), Mingjian +Zhou (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a href="http://c0reteam.org">C0RE Team</a> </td> <td>CVE-2017-17767, CVE-2017-6279 @@ -357,7 +410,7 @@ href="http://c0reteam.org">C0RE Team</a> </tr> <tr> <td>Mingjian Zhou (周明建) (<a -href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a +href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a href="http://c0reteam.org">C0RE Team</a> </td> <td>CVE-2017-13241, CVE-2017-13231 @@ -371,7 +424,7 @@ href="http://c0reteam.org">C0RE Team</a> </tr> <tr> <td><a href="mailto:jiych.guru@gmail.com">Niky1235</a> (<a -href="https://twitter.com/jiych_guru">@jiych_guru</a>) +href="https://twitter.com/jiych_guru">@jiych_guru</a>) </td> <td>CVE-2017-13230, CVE-2017-13234 </td> @@ -384,7 +437,7 @@ href="https://twitter.com/jiych_guru">@jiych_guru</a>) </tr> <tr> <td>Qidan He (<a -href="https://twitter.com/flanker_hqd?lang=en">@flanker_hqd</a>) of PDD Security +href="https://twitter.com/flanker_hqd?lang=en">@flanker_hqd</a>) of PDD Security Team </td> <td>CVE-2017-13246 @@ -397,7 +450,7 @@ Team </td> </tr> <tr> - <td>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of + <td>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of IceSword Lab, Qihoo 360 Technology Co. Ltd. </td> <td>CVE-2017-13273 @@ -439,12 +492,12 @@ href="https://labs.mwrinfosecurity.com/">MWR Labs</a></td> <td>CVE-2017-13212</td> </tr> <tr> - <td>Andy Tyler (<a href="https://twitter.com/ticarpi">@ticarpi</a>) of <a + <td>Andy Tyler (<a href="https://twitter.com/ticarpi">@ticarpi</a>) of <a href="http://www.e2e-assure.com ">e2e-assure</a></td> <td>CVE-2017-0846</td> </tr> <tr> - <td>Baozeng Ding (<a href="https://twitter.com/sploving1">@sploving</a>), + <td>Baozeng Ding (<a href="https://twitter.com/sploving1">@sploving</a>), Chengming Yang, and Yang Song of Pandora Lab, Ali Security</td> <td>CVE-2017-13222, CVE-2017-13220</td> </tr> @@ -458,7 +511,7 @@ Chengming Yang, and Yang Song of Pandora Lab, Ali Security</td> </tr> <tr> <td><a href="mailto:zc1991@mail.ustc.edu.cn">Chi Zhang</a> and Mingjian Zhou -(<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a +(<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a href="http://c0reteam.org">C0RE Team</a></td> <td>CVE-2017-13178, CVE-2017-13179</td> </tr> @@ -467,19 +520,19 @@ href="http://c0reteam.org">C0RE Team</a></td> <td>CVE-2017-13209</td> </tr> <tr> - <td>Haosheng Wang (<a href="https://twitter.com/gnehsoah">@gnehsoah</a>)</td> + <td>Haosheng Wang (<a href="https://twitter.com/gnehsoah">@gnehsoah</a>)</td> <td>CVE-2017-13198</td> </tr> <tr> - <td>Hongli Han (<a href="https://twitter.com/HexB1n">@HexB1n</a>) and -Mingjian Zhou (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) + <td>Hongli Han (<a href="https://twitter.com/HexB1n">@HexB1n</a>) and +Mingjian Zhou (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a href="http://c0reteam.org">C0RE Team</a></td> <td>CVE-2017-13183, CVE-2017-13180</td> </tr> <tr> - <td>Hongli Han (<a href="https://twitter.com/HexB1n">@HexB1n</a>), <a + <td>Hongli Han (<a href="https://twitter.com/HexB1n">@HexB1n</a>), <a href="mailto:shaodacheng2016@gmail.com">Dacheng Shao</a>, and Mingjian Zhou (<a -href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a +href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a href="http://c0reteam.org">C0RE Team</a></td> <td>CVE-2017-13194</td> </tr> @@ -489,13 +542,13 @@ href="http://c0reteam.org">C0RE Team</a></td> </tr> <tr> <td>Mingjian Zhou (周明建) (<a -href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a +href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a href="http://c0reteam.org">C0RE Team</a></td> <td>CVE-2017-13184, CVE-2017-13201</td> </tr> <tr> <td><a href="mailto:jiych.guru@gmail.com">Niky1235</a> (<a -href="https://twitter.com/jiych_guru">@jiych_guru</a>)</td> +href="https://twitter.com/jiych_guru">@jiych_guru</a>)</td> <td>CVE-2017-0855, CVE-2017-13195, CVE-2017-13181</td> </tr> <tr> @@ -510,7 +563,7 @@ Academy of Sciences</td> <td>CVE-2017-13176</td> </tr> <tr> - <td>V.E.O (<a href="https://twitter.com/vysea">@VYSEa</a>) of <a + <td>V.E.O (<a href="https://twitter.com/vysea">@VYSEa</a>) of <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/category/mobile/">Mobile Threat Response Team</a>, <a href="http://www.trendmicro.com">Trend Micro</a></td> <td>CVE-2017-13196, CVE-2017-13186</td> @@ -524,12 +577,12 @@ Threat Response Team</a>, <a href="http://www.trendmicro.com">Trend Micro</a></t <td>CVE-2017-13217</td> </tr> <tr> - <td>Yangkang (<a href="https://twitter.com/dnpushme">@dnpushme</a>) of + <td>Yangkang (<a href="https://twitter.com/dnpushme">@dnpushme</a>) of Qihoo360 Qex Team</td> <td>CVE-2017-13200</td> </tr> <tr> - <td>Yongke Wang (<a href="https://twitter.com/Rudykewang">@Rudykewang</a>) + <td>Yongke Wang (<a href="https://twitter.com/Rudykewang">@Rudykewang</a>) and Yuebin Sun of <a href="http://xlab.tencent.com">Tencent's Xuanwu Lab</a></td> <td>CVE-2017-13202</td> </tr> @@ -577,7 +630,7 @@ Response Center, Qihoo 360 Technology Co. Ltd.</td> <td>CVE-2017-0650</td> </tr> <tr> - <td>Ao Wang (<a href="https://twitter.com/ArayzSegment">@ArayzSegment</a>) of + <td>Ao Wang (<a href="https://twitter.com/ArayzSegment">@ArayzSegment</a>) of <a href="https://www.pwnzen.com/">Pangu Team</a></td> <td>CVE-2017-0691, CVE-2017-0700</td> </tr> @@ -591,7 +644,7 @@ Barbara</td> <td>CVE-2017-0650</td> </tr> <tr> - <td>Baozeng Ding (<a href="https://twitter.com/sploving1">@sploving1</a>) of + <td>Baozeng Ding (<a href="https://twitter.com/sploving1">@sploving1</a>) of Alibaba Mobile Security Group</td> <td>CVE-2017-0463, CVE-2017-0506, CVE-2017-0711, CVE-2017-0741, CVE-2017-0742, CVE-2017-0751, CVE-2017-0796, CVE-2017-0798, CVE-2017-0800, @@ -599,7 +652,7 @@ CVE-2017-0827, CVE-2017-0843, CVE-2017-0864, CVE-2017-9703, CVE-2017-9708, CVE-2017-11000, CVE-2017-11059, CVE-2017-13170</td> </tr> <tr> - <td>Ben Actis (<a href="https://twitter.com/ben_ra">@Ben_RA</a>)</td> + <td>Ben Actis (<a href="https://twitter.com/ben_ra">@Ben_RA</a>)</td> <td>CVE-2016-8461</td> </tr> <tr> @@ -647,7 +700,7 @@ href="https://c0reteam.org/">C0RE Team</a></td> CVE-2017-0836, CVE-2017-0857, CVE-2017-0880, CVE-2017-13166</td> </tr> <tr> - <td>Chiachih Wu (<a href="https://twitter.com/chiachih_wu">@chiachih_wu</a>) + <td>Chiachih Wu (<a href="https://twitter.com/chiachih_wu">@chiachih_wu</a>) of <a href="http://c0reteam.org/">C0RE Team</a></td> <td>CVE-2016-8425, CVE-2016-8426, CVE-2016-8430, CVE-2016-8431, CVE-2016-8432, CVE-2016-8449, CVE-2016-8435, CVE-2016-8480, CVE-2016-8481, @@ -661,7 +714,7 @@ Response Center, Qihoo 360 Technology Co. Ltd.</td> <td>CVE-2017-0758</td> </tr> <tr> - <td>Cong Zheng (<a href="https://twitter.com/shellcong">@shellcong</a>) of + <td>Cong Zheng (<a href="https://twitter.com/shellcong">@shellcong</a>) of Palo Alto Networks</td> <td>CVE-2017-0752</td> </tr> @@ -688,19 +741,19 @@ href="http://c0reteam.org/">C0RE Team</a></td> CVE-2017-13160</td> </tr> <tr> - <td>Daxing Guo (<a href="https://twitter.com/freener0">@freener0</a>) of + <td>Daxing Guo (<a href="https://twitter.com/freener0">@freener0</a>) of Xuanwu Lab, Tencent</td> <td>CVE-2017-0386, CVE-2017-0553, CVE-2017-0585, CVE-2017-0706</td> </tr> <tr> <td><a href="mailto:derrek.haxx@gmail.com">derrek</a> (<a -href="https://twitter.com/derrekr6">@derrekr6</a>)</td> +href="https://twitter.com/derrekr6">@derrekr6</a>)</td> <td>CVE-2016-8413, CVE-2016-8477, CVE-2017-0392, CVE-2017-0521, CVE-2017-0531, CVE-2017-0576, CVE-2017-8260</td> </tr> <tr> - <td>Di Shen (<a href="https://twitter.com/returnsme">@returnsme</a>) of -KeenLab (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</td> + <td>Di Shen (<a href="https://twitter.com/returnsme">@returnsme</a>) of +KeenLab (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</td> <td>CVE-2016-8412, CVE-2016-8427, CVE-2016-8444, CVE-2016-10287, CVE-2017-0334, CVE-2017-0403, CVE-2017-0427, CVE-2017-0456, CVE-2017-0457, CVE-2017-0525, CVE-2017-8265</td> @@ -727,7 +780,7 @@ CVE-2017-0525, CVE-2017-8265</td> <td>CVE-2017-0692, CVE-2017-0694, CVE-2017-0771, CVE-2017-0774, CVE-2017-0775</td> </tr> <tr> - <td>En He (<a href="http://twitter.com/heeeeen4x">@heeeeen4x</a>) of <a + <td>En He (<a href="http://twitter.com/heeeeen4x">@heeeeen4x</a>) of <a href="http://www.ms509.com/">MS509Team</a></td> <td>CVE-2017-0394, CVE-2017-0490, CVE-2017-0601, CVE-2017-0639, CVE-2017-0645, CVE-2017-0784, CVE-2017-11042</td> @@ -756,7 +809,7 @@ CVE-2017-0645, CVE-2017-0784, CVE-2017-11042</td> </tr> <tr> <td>Gengjia Chen (<a -href="https://twitter.com/chengjia4574">@chengjia4574</a>) of IceSword Lab, +href="https://twitter.com/chengjia4574">@chengjia4574</a>) of IceSword Lab, Qihoo 360 Technology Co. Ltd.</td> <td>CVE-2016-8464, CVE-2016-10285, CVE-2016-10288, CVE-2016-10290, CVE-2016-10294, CVE-2016-10295, CVE-2016-10296, CVE-2017-0329, CVE-2017-0332, @@ -769,7 +822,7 @@ CVE-2017-9691, CVE-2017-10997</td> </tr> <tr> <td>Godzheng (郑文选 <a -href="https://twitter.com/virtualseekers">@VirtualSeekers</a>) of Tencent PC +href="https://twitter.com/virtualseekers">@VirtualSeekers</a>) of Tencent PC Manager</td> <td>CVE-2017-0602, CVE-2017-0646</td> </tr> @@ -782,7 +835,7 @@ Manager</td> <td>CVE-2017-0781, CVE-2017-0782, CVE-2017-0783, CVE-2017-0785</td> </tr> <tr> - <td>Guang Gong (龚广) (<a href="http://twitter.com/oldfresher">@oldfresher</a>) + <td>Guang Gong (龚广) (<a href="http://twitter.com/oldfresher">@oldfresher</a>) of Alpha Team, <a href="http://www.360.com/">Qihoo 360 Technology Co. Ltd.</a></td> <td>CVE-2016-8415, CVE-2016-8419, CVE-2016-8420, CVE-2016-8421, CVE-2016-8454, CVE-2016-8455, CVE-2016-8456, CVE-2016-8457, CVE-2016-8465, @@ -837,7 +890,7 @@ CVE-2017-0792, CVE-2017-0825, CVE-2017-6424</td> </tr> <tr> <td><a href="mailto:hlhan@bupt.edu.cn">Hongli Han</a> - (<a href="https://twitter.com/HexB1n">@HexB1n</a>) of + (<a href="https://twitter.com/HexB1n">@HexB1n</a>) of <a href="http://c0reteam.org/">C0RE Team</a></td> <td>CVE-2017-0384, CVE-2017-0385, CVE-2017-0731, CVE-2017-0739, CVE-2017-13154, CVE-2017-6276 @@ -848,7 +901,7 @@ CVE-2017-0792, CVE-2017-0825, CVE-2017-6424</td> <td>CVE-2017-0753</td> </tr> <tr> - <td>Ian Foster (<a href="https://twitter.com/lanrat">@lanrat</a>)</td> + <td>Ian Foster (<a href="https://twitter.com/lanrat">@lanrat</a>)</td> <td>CVE-2017-0554</td> </tr> <tr> @@ -873,18 +926,18 @@ CVE-2017-0792, CVE-2017-0825, CVE-2017-6424</td> </tr> <tr> <td>Jeremy Huang - (<a href="https://twitter.com/bittorrent3389">@bittorrent3389</a>) + (<a href="https://twitter.com/bittorrent3389">@bittorrent3389</a>) of King Team</td> <td>CVE-2017-13172</td> </tr> <tr> - <td>Jianjun Dai (<a href="https://twitter.com/Jioun_dai">@Jioun_dai</a>) of + <td>Jianjun Dai (<a href="https://twitter.com/Jioun_dai">@Jioun_dai</a>) of <a href="https://skyeye.360safe.com/">Qihoo 360 Skyeye Labs</a></td> <td>CVE-2017-0478, CVE-2017-0541, CVE-2017-0559</td> </tr> <tr> <td>Jianqiang Zhao (<a -href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>) of IceSword Lab, +href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>) of IceSword Lab, Qihoo 360</td> <td>CVE-2016-5346, CVE-2016-8416, CVE-2016-8475, CVE-2016-8478, CVE-2017-0445, CVE-2017-0458, CVE-2017-0459, CVE-2017-0518, CVE-2017-0519, @@ -896,7 +949,7 @@ CVE-2017-8261, CVE-2017-8268, CVE-2017-9718, CVE-2017-1000380</td> <td>CVE-2017-0698</td> </tr> <tr> - <td>Jon Sawyer (<a href="http://twitter.com/jcase">@jcase</a>)</td> + <td>Jon Sawyer (<a href="http://twitter.com/jcase">@jcase</a>)</td> <td>CVE-2016-8461, CVE-2016-8462</td> </tr> <tr> @@ -951,7 +1004,7 @@ href="http://c0reteam.org/">C0RE Team</a></td> <td>CVE-2017-0491</td> </tr> <tr> - <td>Marco Bartoli (<a href="https://twitter.com/wsxarcher">@wsxarcher</a>)</td> + <td>Marco Bartoli (<a href="https://twitter.com/wsxarcher">@wsxarcher</a>)</td> <td>CVE-2017-0712</td> </tr> <tr> @@ -971,13 +1024,13 @@ href="http://c0reteam.org/">C0RE Team</a></td> <td>CVE-2017-0598, CVE-2017-0806, CVE-2017-0871</td> </tr> <tr> - <td>Mike Anderson (<a href="https://twitter.com/manderbot">@manderbot</a>) of + <td>Mike Anderson (<a href="https://twitter.com/manderbot">@manderbot</a>) of Tesla Motors Product Security Team</td> <td>CVE-2017-0327, CVE-2017-0328</td> </tr> <tr> <td>Mingjian Zhou (<a -href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a +href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a href="http://c0reteam.org/">C0RE Team</a></td> <td>CVE-2017-0383, CVE-2017-0417, CVE-2017-0418, CVE-2017-0425, CVE-2017-0450, CVE-2017-0479, CVE-2017-0480, CVE-2017-0483, CVE-2017-0665, @@ -997,11 +1050,11 @@ CVE-2017-13152, CVE-2017-13154, CVE-2017-13166, CVE-2017-13169, CVE-2017-14904 <td>CVE-2016-10276</td> </tr> <tr> - <td>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>)</td> + <td>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>)</td> <td>CVE-2017-0535</td> </tr> <tr> - <td>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>) of + <td>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>) of Tesla Motors Product Security Team</td> <td>CVE-2017-0306, CVE-2017-0327, CVE-2017-0328, CVE-2017-0331, CVE-2017-0606, CVE-2017-8242, CVE-2017-9679</td> @@ -1016,7 +1069,7 @@ CVE-2017-0606, CVE-2017-8242, CVE-2017-9679</td> </tr> <tr> <td><a href="mailto:jiych.guru@gmail.com">Niky1235</a> (<a -href="https://twitter.com/jiych_guru">@jiych_guru</a>)</td> +href="https://twitter.com/jiych_guru">@jiych_guru</a>)</td> <td>CVE-2017-0603, CVE-2017-0670, CVE-2017-0697, CVE-2017-0726, CVE-2017-0818</td> </tr> <tr> @@ -1053,7 +1106,7 @@ CVE-2017-11060, CVE-2017-11061, CVE-2017-11064, CVE-2017-11089, CVE-2017-11090</ <td>CVE-2017-11046, CVE-2017-11091</td> </tr> <tr> - <td>Peter Pi (<a href="https://twitter.com/heisecode">@heisecode</a>) of + <td>Peter Pi (<a href="https://twitter.com/heisecode">@heisecode</a>) of Trend Micro</td> <td>CVE-2016-8424, CVE-2016-8428, CVE-2016-8429, CVE-2016-8460, CVE-2016-8469, CVE-2016-8473, CVE-2016-8474</td> @@ -1075,7 +1128,7 @@ CVE-2017-8270, CVE-2017-9691, CVE-2017-9718, CVE-2017-10997, CVE-2017-1000380</t </tr> <tr> <td>Qidan He (何淇丹) (<a -href="https://twitter.com/flanker_hqd">@flanker_hqd</a>) of KeenLab, Tencent +href="https://twitter.com/flanker_hqd">@flanker_hqd</a>) of KeenLab, Tencent (腾讯科恩实验室)</td> <td>CVE-2017-0325, CVE-2017-0337, CVE-2017-0382, CVE-2017-0427, CVE-2017-0476, CVE-2017-0544, CVE-2017-0861, CVE-2017-0866, CVE-2017-13167, @@ -1094,7 +1147,7 @@ CVE-2017-15868</td> <td>CVE-2017-0522</td> </tr> <tr> - <td>Roee Hay (<a href="https://twitter.com/roeehay">@roeehay</a>) of Aleph + <td>Roee Hay (<a href="https://twitter.com/roeehay">@roeehay</a>) of Aleph Research, HCL Technologies</td> <td>CVE-2016-10277, CVE-2017-0563, CVE-2017-0582, CVE-2017-0648, CVE-2017-0829, CVE-2017-13174</td> @@ -1113,24 +1166,24 @@ Communications in DarkMatter</td> <td>CVE-2017-0528</td> </tr> <tr> - <td>salls (<a href="https://twitter.com/chris_salls">@chris_salls</a>) of + <td>salls (<a href="https://twitter.com/chris_salls">@chris_salls</a>) of Shellphish Grill Team, UC Santa Barbara</td> <td>CVE-2017-0505, CVE-2017-13168</td> </tr> <tr> <td><a href="mailto:sbauer@plzdonthack.me">Scott Bauer</a> (<a -href="https://twitter.com/ScottyBauer1">@ScottyBauer1</a>)</td> +href="https://twitter.com/ScottyBauer1">@ScottyBauer1</a>)</td> <td>CVE-2016-10274, CVE-2017-0339, CVE-2017-0405, CVE-2017-0504, CVE-2017-0516, CVE-2017-0521, CVE-2017-0562, CVE-2017-0576, CVE-2017-0705, CVE-2017-8259, CVE-2017-8260, CVE-2017-9680, CVE-2017-11053, CVE-2017-13160</td> </tr> <tr> <td>Sean Beaupre (<a -href="https://twitter.com/firewaterdevs">@firewaterdevs</a>)</td> +href="https://twitter.com/firewaterdevs">@firewaterdevs</a>)</td> <td>CVE-2016-8461, CVE-2016-8462, CVE-2017-0455</td> </tr> <tr> - <td>Seven Shen (<a href="https://twitter.com/lingtongshen">@lingtongshen</a>) + <td>Seven Shen (<a href="https://twitter.com/lingtongshen">@lingtongshen</a>) of Trend Micro Mobile Threat Research Team</td> <td>CVE-2016-8418, CVE-2016-8466, CVE-2016-10231, CVE-2017-0449, CVE-2017-0452, CVE-2017-0578, CVE-2017-0586, CVE-2017-0724, CVE-2017-0772, @@ -1174,11 +1227,11 @@ CVE-2017-0436, CVE-2017-10661</td> </tr> <tr> <td>Uma Sankar Pradhan (<a -href="https://twitter.com/umasankar_iitd">@umasankar_iitd</a>)</td> +href="https://twitter.com/umasankar_iitd">@umasankar_iitd</a>)</td> <td>CVE-2017-0560</td> </tr> <tr> - <td>Valerio Costamagna (<a href="https://twitter.com/vaio_co">@vaio_co</a>)</td> + <td>Valerio Costamagna (<a href="https://twitter.com/vaio_co">@vaio_co</a>)</td> <td>CVE-2017-0712</td> </tr> <tr> @@ -1188,7 +1241,7 @@ CVE-2017-0675, CVE-2017-0676, CVE-2017-0682, CVE-2017-0683, CVE-2017-0696, CVE-2017-0699, CVE-2017-0701, CVE-2017-0702, CVE-2017-0716, CVE-2017-0757</td> </tr> <tr> - <td>V.E.O (<a href="https://twitter.com/vysea">@VYSEa</a>) of Mobile Threat + <td>V.E.O (<a href="https://twitter.com/vysea">@VYSEa</a>) of Mobile Threat Research Team, <a href="http://www.trendmicro.com/">Trend Micro</a></td> <td>CVE-2017-0381, CVE-2017-0424, CVE-2017-0466, CVE-2017-0467, CVE-2017-0468, CVE-2017-0469, CVE-2017-0470, CVE-2017-0471, CVE-2017-0472, @@ -1205,7 +1258,7 @@ CVE-2017-10662, CVE-2017-10663</td> <td>CVE-2017-0522</td> </tr> <tr> - <td>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of + <td>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of Alibaba Inc.</td> <td>CVE-2017-0391, CVE-2017-0407, CVE-2017-0549, CVE-2017-0759</td> </tr> @@ -1226,12 +1279,12 @@ CVE-2017-0483, CVE-2017-0768, CVE-2017-0779, CVE-2017-0812, CVE-2017-0815, CVE-2017-0816</td> </tr> <tr> - <td>Wenlin Yang (<a href="https://twitter.com/wenlin_yang">@wenlin_yang</a>) + <td>Wenlin Yang (<a href="https://twitter.com/wenlin_yang">@wenlin_yang</a>) of Alpha Team, Qihoo 360 Technology Co. Ltd.</td> <td>CVE-2017-0577, CVE-2017-0580</td> </tr> <tr> - <td>Wish Wu (<a href="https://twitter.com/wish_wu">@wish_wu</a>) (<a + <td>Wish Wu (<a href="https://twitter.com/wish_wu">@wish_wu</a>) (<a href="http://www.weibo.com/wishlinux">吴潍浠</a> 此彼) of Ant-financial Light-Year Security Lab</td> <td>CVE-2017-0408, CVE-2017-0477, CVE-2017-11063, CVE-2017-11092</td> @@ -1314,7 +1367,7 @@ CVE-2017-9708, CVE-2017-13170 <td>CVE-2017-0860</td> </tr> <tr> - <td>Yangkang (<a href="https://twitter.com/dnpushme">@dnpushme</a>) of Qex + <td>Yangkang (<a href="https://twitter.com/dnpushme">@dnpushme</a>) of Qex Team, Qihoo 360</td> <td>CVE-2017-0647, CVE-2017-0690, CVE-2017-0753</td> </tr> @@ -1329,12 +1382,12 @@ href="http://c0reteam.org/">C0RE Team</a></td> </tr> <tr> <td>Yong Wang (王勇) (<a -href="https://twitter.com/ThomasKing2014">@ThomasKing2014</a>) of Alibaba Inc.</td> +href="https://twitter.com/ThomasKing2014">@ThomasKing2014</a>) of Alibaba Inc.</td> <td>CVE-2017-0404, CVE-2017-0588, CVE-2017-0842, CVE-2017-13164, CVE-2017-9708, CVE-2017-13170 </td> </tr> <tr> - <td>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of + <td>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of IceSword Lab, Qihoo 360 Technology Co. Ltd.</td> <td>CVE-2016-10289, CVE-2017-0465, CVE-2017-0564, CVE-2017-0746, CVE-2017-0749, CVE-2017-7370, CVE-2017-8267, CVE-2017-8269, CVE-2017-8271, @@ -1372,22 +1425,22 @@ CVE-2017-8264, CVE-2017-10661, CVE-2017-14903</td> <td>CVE-2017-0767, CVE-2017-0839, CVE-2017-0848</td> </tr> <tr> - <td>Yuqi Lu (<a href="https://twitter.com/nikos233__">@nikos233</a>) of <a + <td>Yuqi Lu (<a href="https://twitter.com/nikos233__">@nikos233</a>) of <a href="http://c0reteam.org/">C0RE Team</a></td> <td>CVE-2017-0383, CVE-2017-0401, CVE-2017-0417, CVE-2017-0425, CVE-2017-0483</td> </tr> <tr> - <td>Yuxiang Li (<a href="https://twitter.com/xbalien29">@Xbalien29</a>) of + <td>Yuxiang Li (<a href="https://twitter.com/xbalien29">@Xbalien29</a>) of Tencent Security Platform Department</td> <td>CVE-2017-0395, CVE-2017-0669, CVE-2017-0704</td> </tr> <tr> - <td>Zach Riggle (<a href="https://twitter.com/ebeip90">@ebeip90</a>) of the + <td>Zach Riggle (<a href="https://twitter.com/ebeip90">@ebeip90</a>) of the Android Security Team</td> <td>CVE-2017-0710</td> </tr> <tr> - <td>Zhanpeng Zhao (行之) (<a href="https://twitter.com/0xr0ot">@0xr0ot</a>) of + <td>Zhanpeng Zhao (行之) (<a href="https://twitter.com/0xr0ot">@0xr0ot</a>) of Security Research Lab, <a href="http://www.cmcm.com/">Cheetah Mobile</a></td> <td>CVE-2016-8451</td> </tr> @@ -1398,7 +1451,7 @@ Co. Ltd.</td> </tr> <tr> <td><a href="mailto:zhouzhenster@gmail.com">Zhen Zhou</a> (<a -href="https://twitter.com/henices">@henices</a>) of <a +href="https://twitter.com/henices">@henices</a>) of <a href="http://www.nsfocus.com/">NSFocus</a></td> <td>CVE-2017-0406</td> </tr> @@ -1457,12 +1510,12 @@ Telecommunications</a></p> <p>Andrei Kapishnikov of Google</p> -<p>Andy Tyler (<a href="https://twitter.com/ticarpi">@ticarpi</a>) of +<p>Andy Tyler (<a href="https://twitter.com/ticarpi">@ticarpi</a>) of <a href="https://www.e2e-assure.com">e2e-assure</a></p> -<p>Anestis Bechtsoudis (<a href="https://twitter.com/anestisb">@anestisb</a>) of CENSUS S.A.</p> +<p>Anestis Bechtsoudis (<a href="https://twitter.com/anestisb">@anestisb</a>) of CENSUS S.A.</p> -<p>Ao Wang (<a href="https://twitter.com/ArayzSegment">@ArayzSegment</a>) of +<p>Ao Wang (<a href="https://twitter.com/ArayzSegment">@ArayzSegment</a>) of <a href="http://www.pkav.net">PKAV</a>, Silence Information Technology</p> <p>Askyshang of Security Platform Department, Tencent</p> @@ -1487,7 +1540,7 @@ Telecommunications</a></p> <p><a href="mailto:zc1991@mail.ustc.edu.cn">Chi Zhang</a> of <a href="http://c0reteam.org">C0RE Team</a></p> -<p>Chiachih Wu (<a href="https://twitter.com/chiachih_wu">@chiachih_wu</a>) of +<p>Chiachih Wu (<a href="https://twitter.com/chiachih_wu">@chiachih_wu</a>) of <a href="http://c0reteam.org">C0RE Team</a> from <a href="http://www.360safe.com/">Qihoo 360</a></p> <p>Christian Seel</p> @@ -1536,16 +1589,16 @@ Telecommunications</a></p> <p><a href="mailto:talepis@unipi.gr">Efthimios Alepis</a> of University of Piraeus</p> -<p>En He (<a href="https://twitter.com/heeeeen4x">@heeeeen4x</a>) of <a +<p>En He (<a href="https://twitter.com/heeeeen4x">@heeeeen4x</a>) of <a href="http://www.ms509.com">MS509Team</a></p> -<p>Gal Beniamini (<a href="https://twitter.com/@laginimaineb">@laginimaineb</a>, +<p>Gal Beniamini (<a href="https://twitter.com/@laginimaineb">@laginimaineb</a>, <a href="http://bits-please.blogspot.com/">http://bits-please.blogspot.com</a>)</p> -<p>Gengjia Chen (<a href="https://twitter.com/@chengjia4574">@chengjia4574</a>) +<p>Gengjia Chen (<a href="https://twitter.com/@chengjia4574">@chengjia4574</a>) of Lab 0x031E, Qihoo 360 Technology Co. Ltd</p> -<p>Gengming Liu (刘耕铭) (<a href="http://twitter.com/dmxcsnsbh">@dmxcsnsbh</a>) +<p>Gengming Liu (刘耕铭) (<a href="http://twitter.com/dmxcsnsbh">@dmxcsnsbh</a>) of KeenLab, Tencent</p> <p><a href="mailto:gpiskas@gmail.com">George Piskas</a> of @@ -1555,7 +1608,7 @@ Telecommunications</a></p> <p>Greg Kaiser of Google Android Team</p> -<p>Guang Gong (龚广) (<a href="https://twitter.com/oldfresher">@oldfresher</a>) +<p>Guang Gong (龚广) (<a href="https://twitter.com/oldfresher">@oldfresher</a>) of <a href="http://www.360.com/">Qihoo 360 Technology Co. Ltd.</a></p> <p><a href="mailto:hzhan033@ucr.edu">Hang Zhang</a> of UC Riverside</p> @@ -1585,15 +1638,15 @@ Telecommunications</a></p> <p>Jeremy C. Joslin of Google</p> -<p>jfang of KEEN lab, Tencent (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p> +<p>jfang of KEEN lab, Tencent (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p> -<p>Jianqiang Zhao (<a href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>) of IceSword Lab, Qihoo 360</p> +<p>Jianqiang Zhao (<a href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>) of IceSword Lab, Qihoo 360</p> -<p>Joshua Drake (<a href="https://twitter.com/jduck">@jduck</a>)</p> +<p>Joshua Drake (<a href="https://twitter.com/jduck">@jduck</a>)</p> <p>Jouni Malinen PGP id EFC895FA</p> -<p>Kai Lu (<a href="https://twitter.com/K3vinLuSec">@K3vinLuSec</a>) of +<p>Kai Lu (<a href="https://twitter.com/K3vinLuSec">@K3vinLuSec</a>) of Fortinet's FortiGuard Labs</p> <p>Kandala Shivaram reddy</p> @@ -1613,8 +1666,8 @@ Fortinet's FortiGuard Labs</p> <p>Makoto Onuki of Google</p> -<p>Marco Grassi (<a href="https://twitter.com/marcograss">@marcograss</a>) of KeenLab - (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p> +<p>Marco Grassi (<a href="https://twitter.com/marcograss">@marcograss</a>) of KeenLab + (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p> <p>Marco Nelissen of Google</p> @@ -1628,7 +1681,7 @@ Fortinet's FortiGuard Labs</p> <p>Max Spector of Google</p> -<p>MengLuo Gou (<a href="https://twitter.com/idhyt3r">@idhyt3r</a>) of Bottle +<p>MengLuo Gou (<a href="https://twitter.com/idhyt3r">@idhyt3r</a>) of Bottle Tech</p> <p>Michał Bednarski (<a href="https://github.com/michalbednarski">github.com/michalbednarski</a>)</p> @@ -1637,7 +1690,7 @@ Fortinet's FortiGuard Labs</p> <p>Min Chong of Android Security</p> -<p>Mingjian Zhou (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) +<p>Mingjian Zhou (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a href="http://c0reteam.org">C0RE Team</a>, <a href="http://www.360safe.com/">Qihoo 360</a></p> <p>Miriam Gershenson of Google</p> @@ -1646,13 +1699,13 @@ Fortinet's FortiGuard Labs</p> <p><a href="mailto:nasim@zamir.ca">Nasim Zamir</a></p> -<p>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>) of +<p>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>) of Tesla Motors Product Security Team</p> -<p>Nico Golde (<a href="https://twitter.com/iamnion">@iamnion</a>) of Qualcomm Product Security Initiative</p> +<p>Nico Golde (<a href="https://twitter.com/iamnion">@iamnion</a>) of Qualcomm Product Security Initiative</p> <p>Nightwatch Cybersecurity Research - (<a href="https://twitter.com/nightwatchcyber">@nightwatchcyber</a>)</p> + (<a href="https://twitter.com/nightwatchcyber">@nightwatchcyber</a>)</p> <p>Ning You of Alibaba Mobile Security Group</p> @@ -1666,7 +1719,7 @@ Tesla Motors Product Security Team</p> <p>Pengfei Ding (丁鹏飞) of Baidu X-Lab</p> -<p>Peter Pi (<a href="https://twitter.com/heisecode">@heisecode</a>) of Trend Micro</p> +<p>Peter Pi (<a href="https://twitter.com/heisecode">@heisecode</a>) of Trend Micro</p> <p><a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360</p> @@ -1675,8 +1728,8 @@ Tesla Motors Product Security Team</p> <p>Qianwei Hu (<a href="mailto:rayxcp@gmail.com">rayxcp@gmail.com</a>) of <a href="http://www.wooyun.org/">WooYun TangLab</a></p> -<p>Qidan He (<a href="https://twitter.com/@Flanker_hqd">@Flanker_hqd</a>) of - KeenLab (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p> +<p>Qidan He (<a href="https://twitter.com/@Flanker_hqd">@Flanker_hqd</a>) of + KeenLab (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p> <p>Richard Shupak</p> @@ -1691,7 +1744,7 @@ Tesla Motors Product Security Team</p> <p>Romain Trouvé of <a href="https://labs.mwrinfosecurity.com/">MWR Labs</a></p> -<p>Ronald L. Loor Vargas (<a href="https://twitter.com/loor_rlv">@loor_rlv</a>) +<p>Ronald L. Loor Vargas (<a href="https://twitter.com/loor_rlv">@loor_rlv</a>) of TEAM Lv51</p> <p>Sagi Kedmi, IBM Security X-Force Researcher</p> @@ -1701,20 +1754,20 @@ of TEAM Lv51</p> <p>Santos Cordon of Google Telecom Team</p> <p><a href="mailto:sbauer@plzdonthack.me">Scott Bauer</a> - (<a href="https://twitter.com/ScottyBauer1">@ScottyBauer1</a>)</p> + (<a href="https://twitter.com/ScottyBauer1">@ScottyBauer1</a>)</p> -<p>Sen Nie (<a href="https://twitter.com/@nforest_">@nforest_</a>) of KEEN lab, - Tencent (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p> +<p>Sen Nie (<a href="https://twitter.com/@nforest_">@nforest_</a>) of KEEN lab, + Tencent (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p> -<p>Sergey Bobrov (<a href="http://twitter.com/Black2Fan">@Black2Fan</a>) of +<p>Sergey Bobrov (<a href="http://twitter.com/Black2Fan">@Black2Fan</a>) of Kaspersky Lab</p> -<p>Seven Shen (<a href="https://twitter.com/@lingtongshen">@lingtongshen</a>) +<p>Seven Shen (<a href="https://twitter.com/@lingtongshen">@lingtongshen</a>) of Trend Micro (<a href="http://www.trendmicro.com">www.trendmicro.com</a>)</p> <p>Sharvil Nanavati of Google</p> -<p>Shinjo Park (<a href="https://twitter.com/ad_ili_rai">@ad_ili_rai</a>) of +<p>Shinjo Park (<a href="https://twitter.com/ad_ili_rai">@ad_ili_rai</a>) of <a href="http://www.isti.tu-berlin.de/security_in_telecommunications">Security in Telecommunications</a></p> @@ -1728,7 +1781,7 @@ Telecommunications</a></p> <p>Tieyan Li of Huawei</p> -<p>Tim Strazzere (<a href="https://twitter.com/timstrazz">@timstrazz</a>) of +<p>Tim Strazzere (<a href="https://twitter.com/timstrazz">@timstrazz</a>) of SentinelOne / RedNaga</p> <p>Tom Craig of Google X</p> @@ -1740,7 +1793,7 @@ SentinelOne / RedNaga</p> <p><a href="mailto:litongxin1991@gmail.com">Tongxin Li</a> of Peking University</p> -<p>trotmaster (<a href="https://twitter.com/trotmaster99">@trotmaster99</a>)</p> +<p>trotmaster (<a href="https://twitter.com/trotmaster99">@trotmaster99</a>)</p> <p>Vasily Vasilev</p> @@ -1752,13 +1805,13 @@ SentinelOne / RedNaga</p> <p>Vishwath Mohan of Android Security</p> -<p>Wei Wei (<a href="https://twitter.com/Danny__Wei">@Danny__Wei</a>) of Xuanwu +<p>Wei Wei (<a href="https://twitter.com/Danny__Wei">@Danny__Wei</a>) of Xuanwu LAB, Tencent</p> -<p>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of Alibaba Inc</p> +<p>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of Alibaba Inc</p> -<p>Wen Niu (<a href="https://twitter.com/NWMonster">@NWMonster</a>) of KeenLab - (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p> +<p>Wen Niu (<a href="https://twitter.com/NWMonster">@NWMonster</a>) of KeenLab + (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p> <p><a href="mailto:vancouverdou@gmail.com">Wenke Dou</a> of <a href="http://c0reteam.org">C0RE Team</a></p> @@ -1766,7 +1819,7 @@ SentinelOne / RedNaga</p> <p>William Roberts (<a href="mailto:william.c.roberts@intel.com">william.c.roberts@intel.com</a>)</p> -<p>Wish Wu (<a href="https://twitter.com/wish_wu">@wish_wu</a>) (<a +<p>Wish Wu (<a href="https://twitter.com/wish_wu">@wish_wu</a>) (<a href="http://weibo.com/wishlinux">吴潍浠</a>) of <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/category/mobile/">Mobile Threat Response Team</a>, <a href="http://www.trendmicro.com">Trend Micro @@ -1780,7 +1833,7 @@ SentinelOne / RedNaga</p> <p>Xiling Gong of Tencent Security Platform Department</p> -<p>Xingyu He (何星宇) (<a href="https://twitter.com/Spid3r_">@Spid3r_</a>) +<p>Xingyu He (何星宇) (<a href="https://twitter.com/Spid3r_">@Spid3r_</a>) of <a href="http://www.alibaba.com/">Alibaba Inc</a></p> <p><a href="mailto:hanxinhui@pku.edu.cn">Xinhui Han</a> of Peking University</p> @@ -1812,10 +1865,10 @@ SentinelOne / RedNaga</p> <p>Yong Shi of Eagleye team, SCC, Huawei</p> -<p>Yong Wang (王勇) (<a href="https://twitter.com/ThomasKing2014">@ThomasKing2014</a>) +<p>Yong Wang (王勇) (<a href="https://twitter.com/ThomasKing2014">@ThomasKing2014</a>) of Alibaba Inc.</p> -<p>Yongke Wang (<a href="https://twitter.com/Rudykewang">@Rudykewang</a>) of +<p>Yongke Wang (<a href="https://twitter.com/Rudykewang">@Rudykewang</a>) of Xuanwu LAB, Tencent</p> <p>Yongzheng Wu of Huawei</p> @@ -1827,13 +1880,13 @@ of Alibaba Inc.</p> <p><a href="http://yurushao.info">Yuru Shao</a> of University of Michigan Ann Arbor</p> -<p>Yuxiang Li (<a href="https://twitter.com/xbalien29">@Xbalien29</a>) of +<p>Yuxiang Li (<a href="https://twitter.com/xbalien29">@Xbalien29</a>) of Tencent Security Platform Department</p> -<p>Zach Riggle (<a href="https://twitter.com/@ebeip90">@ebeip90</a>) of the +<p>Zach Riggle (<a href="https://twitter.com/@ebeip90">@ebeip90</a>) of the Android Security Team</p> -<p>Zhanpeng Zhao (行之) (<a href="https://twitter.com/0xr0ot">@0xr0ot</a>) of +<p>Zhanpeng Zhao (行之) (<a href="https://twitter.com/0xr0ot">@0xr0ot</a>) of Security Research Lab, <a href="http://www.cmcm.com">Cheetah Mobile</a></p> <p>Zhe Jin (金哲) of Chengdu Security Response Center, Qihoo 360 Technology Co. @@ -1879,7 +1932,7 @@ of Alibaba Inc.</p> <p>Gal Beniamini (<a href="http://bits-please.blogspot.com/">http://bits-please.blogspot.com</a>)</p> -<p>Guang Gong (龚广) (<a href="https://twitter.com/oldfresher">@oldfresher</a>, higongguang@gmail.com) of <a href="http://www.360.cn/">Qihoo 360 Technology Co.Ltd</a></p> +<p>Guang Gong (龚广) (<a href="https://twitter.com/oldfresher">@oldfresher</a>, higongguang@gmail.com) of <a href="http://www.360.cn/">Qihoo 360 Technology Co.Ltd</a></p> <p>Hongil Kim of System Security Lab, KAIST (hongilk@kaist.ac.kr)</p> @@ -1890,7 +1943,7 @@ Aires Argentina</p> <p>Jack Tang of Trend Micro (@jacktang310)</p> -<p>jgor of <a href="http://security.utexas.edu/">The University of Texas at Austin</a> (<a href="https://twitter.com/indiecom">@indiecom</a>)</p> +<p>jgor of <a href="http://security.utexas.edu/">The University of Texas at Austin</a> (<a href="https://twitter.com/indiecom">@indiecom</a>)</p> <p>Joaquín Rinaudo (@xeroxnir) of Programa STIC at Fundación Dr. Manuel Sadosky, Buenos Aires Argentina</p> @@ -1901,9 +1954,9 @@ Buenos Aires Argentina</p> <p>Lei Wu of C0RE Team from Qihoo 360</p> -<p>Marco Grassi (<a href="https://twitter.com/marcograss">@marcograss</a>) of <a href="http://k33nteam.org/">KeenTeam</a> (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p> +<p>Marco Grassi (<a href="https://twitter.com/marcograss">@marcograss</a>) of <a href="http://k33nteam.org/">KeenTeam</a> (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p> -<p>Mark Carter (<a href="https://twitter.com/hanpingchinese">@hanpingchinese</a>) of EmberMitre Ltd</p> +<p>Mark Carter (<a href="https://twitter.com/hanpingchinese">@hanpingchinese</a>) of EmberMitre Ltd</p> <p>Martin Barbella, Google Chrome Security Team</p> @@ -1936,7 +1989,7 @@ Secure Software Engineering Group</a>, EC SPRIDE Technische Universität</p> <p>Steven Vittitoe of Google Project Zero</p> <p>Tony Beltramelli (<a -href="https://twitter.com/Tbeltramelli">@Tbeltramelli</a>) of <a +href="https://twitter.com/Tbeltramelli">@Tbeltramelli</a>) of <a href="http://tonybeltramelli.com/">tonybeltramelli.com</a></p> <p>Tzu-Yin (Nina) Tai</p> @@ -1961,23 +2014,23 @@ href="http://tonybeltramelli.com/">tonybeltramelli.com</a></p> <p>Aaron Mangel of <a href="https://banno.com/">Banno</a> (<a href="mailto:amangel@gmail.com">amangel@gmail.com</a>)</p> -<p>Alex Park (<a href="https://twitter.com/saintlinu">@saintlinu</a>)</p> +<p>Alex Park (<a href="https://twitter.com/saintlinu">@saintlinu</a>)</p> <p>Alexandru Gheorghita</p> <p><a href="https://twitter.com/isciurus">Andrey Labunets</a> of <a href="https://www.facebook.com">Facebook</a></p> <p><a href="http://www.corkami.com">Ange Albertini</a> (<a -href="https://twitter.com/angealbertini">@angealbertini</a>)</p> +href="https://twitter.com/angealbertini">@angealbertini</a>)</p> <p>Axelle Apvrille of Fortinet, FortiGuards Labs</p> -<p><a href="http://www.linkedin.com/in/danamodio">Dan Amodio</a> of <a href="https://www.aspectsecurity.com/">Aspect Security</a> (<a href="https://twitter.com/DanAmodio">@DanAmodio</a>)</p> +<p><a href="http://www.linkedin.com/in/danamodio">Dan Amodio</a> of <a href="https://www.aspectsecurity.com/">Aspect Security</a> (<a href="https://twitter.com/DanAmodio">@DanAmodio</a>)</p> <p><a href="http://davidmurdoch.com">David Murdoch</a></p> <p>Henry Hoggard of <a href="https://labs.mwrinfosecurity.com/">MWR Labs</a> (<a -href="https://twitter.com/henryhoggard">@HenryHoggard</a>)</p> +href="https://twitter.com/henryhoggard">@HenryHoggard</a>)</p> <p>Imre Rad of <a href="http://www.search-lab.hu/">Search-Lab Ltd.</a></p> @@ -1992,20 +2045,20 @@ Security</a></p> <p><a href="http://blog.redfern.me/">Joseph Redfern</a> of <a href="https://labs.mwrinfosecurity.com/">MWR Labs</a> <br>(<a -href="https://twitter.com/JosephRedfern">@JosephRedfern</a>)</p> +href="https://twitter.com/JosephRedfern">@JosephRedfern</a>)</p> <p>Kunal Patel of <a href="https://www.samsungknox.com/">Samsung KNOX Security Team</a> (<a href="mailto:kunal.patel1@samsung.com">kunal.patel1@samsung.com</a>)</p> <p><a href="http://www.linkedin.com/in/luander">Luander Michel Ribeiro</a> (<a -href="https://twitter.com/luanderock">@luanderock</a>)</p> +href="https://twitter.com/luanderock">@luanderock</a>)</p> <p><a href="http://homes.soic.indiana.edu/luyixing">Luyi Xing</a> of Indiana University Bloomington (<a href="mailto:xingluyi@gmail.com">xingluyi@gmail.com</a>)</p> -<p>Marc Blanchou (<a href="https://twitter.com/marcblanchou">@marcblanchou</a>)</p> +<p>Marc Blanchou (<a href="https://twitter.com/marcblanchou">@marcblanchou</a>)</p> -<p>Mathew Solnik (<a href="https://twitter.com/msolnik">@msolnik</a>)</p> +<p>Mathew Solnik (<a href="https://twitter.com/msolnik">@msolnik</a>)</p> <p><a href="https://github.com/michalbednarski">Michał Bednarski</a></p> @@ -2052,17 +2105,17 @@ href="mailto:litongxin1991@gmail.com">litongxin1991@gmail.com</a>)</p> <p><a href="http://www.linkedin.com/in/tonytrummer/">Tony Trummer</a> of <a href="http://www.themeninthemiddle.com">The Men in the Middle</a> <br>(<a -href="https://twitter.com/SecBro1">@SecBro1</a>)</p> +href="https://twitter.com/SecBro1">@SecBro1</a>)</p> <p><a href="https://www.linkedin.com/in/tdalvi">Tushar Dalvi</a> (<a -href="https://twitter.com/tushardalvi">@tushardalvi</a>)</p> +href="https://twitter.com/tushardalvi">@tushardalvi</a>)</p> <p><a href="https://plus.google.com/u/0/109528607786970714118">Valera Neronov</a></p> <p>Wang Tao of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="mailto:wintao@gmail.com">wintao@gmail.com</a>)</p> -<p>Wang Yu of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="https://twitter.com/xi4oyu">@xi4oyu</a>)</p> +<p>Wang Yu of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="https://twitter.com/xi4oyu">@xi4oyu</a>)</p> <p><a href="http://www.shackleton.io/">Will Shackleton</a> of <a href="https://www.facebook.com">Facebook</a></p> @@ -2079,7 +2132,7 @@ href="mailto:xw7@indiana.edu">xw7@indiana.edu</a>)</p> <p>Xiaoyong Zhou of <a href="http://www.cs.indiana.edu/~zhou/">Indiana University Bloomington</a> <br>(<a -href="https://twitter.com/xzhou">@xzhou</a>, <a +href="https://twitter.com/xzhou">@xzhou</a>, <a href="mailto:zhou.xiaoyong@gmail.com">zhou.xiaoyong@gmail.com</a>)</p> <p>Xinhui Han of Peking University (<a @@ -2089,7 +2142,7 @@ href="mailto:hanxinhui@pku.edu.cn">hanxinhui@pku.edu.cn</a>)</p> href="mailto:luc2yj@gmail.com">luc2yj@gmail.com</a>)</p> <p><a href="http://www.androbugs.com">Yu-Cheng Lin 林禹成</a> (<a -href="https://twitter.com/AndroBugs">@AndroBugs</a>)</p> +href="https://twitter.com/AndroBugs">@AndroBugs</a>)</p> <p>Zhang Dong Hui of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="http://weibo.com/shineastdh">shineastdh</a>)</p> @@ -2107,7 +2160,7 @@ of <a href="http://www.ecommera.com/">eCommera</a> </a> (<a href="mailto:jon@cunninglogic.com">jon@cunninglogic.com</a>)</p> <p>Joshua J. Drake of <a href="http://www.accuvant.com/">Accuvant LABS -</a> (<a href="https://twitter.com/jduck">@jduck</a>) +</a> (<a href="https://twitter.com/jduck">@jduck</a>) <a href="https://android-review.googlesource.com/#/q/change:72228+OR+change:72229"> <img style="vertical-align:middle" src="../images/patchreward.png" alt="Patch Rewards Symbol" title="This person qualified for the Patch Rewards program!"></a></p> @@ -2124,7 +2177,7 @@ href="mailto:xingluyi@gmail.com">xingluyi@gmail.com</a>)</p> <p><a href="https://lacklustre.net/">Mike Ryan</a> of <a href="https://isecpartners.com/">iSEC Partners</a> -<br>(<a href="https://twitter.com/mpeg4codec">@mpeg4codec</a>, +<br>(<a href="https://twitter.com/mpeg4codec">@mpeg4codec</a>, <a href="mailto:mikeryan@isecpartners.com">mikeryan@isecpartners.com </a>)</p> @@ -2135,7 +2188,7 @@ at Urbana-Champaign</a> <p>Qualcomm Product Security Initiative</p> -<p><a href="https://securityresear.ch/">Roee Hay</a> (<a href="https://twitter.com/roeehay">@roeehay</a>, +<p><a href="https://securityresear.ch/">Roee Hay</a> (<a href="https://twitter.com/roeehay">@roeehay</a>, <a href="mailto:roeehay@gmail.com">roeehay@gmail.com</a>)</p> <p>Robert Craig of <a href="https://www.nsa.gov/research/ia_research/"> @@ -2145,7 +2198,7 @@ Trusted Systems Research Group</a>, US National Security Agency title="This person contributed code that improved Android security"></a></p> <p>Ruben Santamarta of IOActive -(<a href="https://twitter.com/reversemode">@reversemode</a>)</p> +(<a href="https://twitter.com/reversemode">@reversemode</a>)</p> <p>Stephen Smalley of <a href="https://www.nsa.gov/research/ia_research/"> Trusted Systems Research Group</a>, US National Security Agency @@ -2172,12 +2225,12 @@ alt="Patch Symbol" title="This person contributed code that improved Android sec <div style="LINE-HEIGHT:25px;"> -<p>David Weinstein (<a href="https://twitter.com/insitusec">@insitusec</a>) +<p>David Weinstein (<a href="https://twitter.com/insitusec">@insitusec</a>) of <a href="https://viaforensics.com/">viaForensics</a></p> <p><a href="http://thejh.net/">Jann Horn</a></p> -<p>Ravishankar Borgaonkari (<a href="https://twitter.com/raviborgaonkar">@raviborgaonkar</a>) of TU Berlin</p> +<p>Ravishankar Borgaonkari (<a href="https://twitter.com/raviborgaonkar">@raviborgaonkar</a>) of TU Berlin</p> <p>Robert Craig of <a href="https://www.nsa.gov/research/ia_research/"> Trusted Systems Research Group</a>, US National Security Agency @@ -2185,7 +2238,7 @@ Trusted Systems Research Group</a>, US National Security Agency <img style="vertical-align:middle" src="../images/tiny-robot.png" alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p> -<p><a href="https://securityresear.ch/">Roee Hay</a> (<a href="https://twitter.com/roeehay">@roeehay</a>, +<p><a href="https://securityresear.ch/">Roee Hay</a> (<a href="https://twitter.com/roeehay">@roeehay</a>, <a href="mailto:roeehay@gmail.com">roeehay@gmail.com</a>)</p> <p>Stephen Smalley of <a href="https://www.nsa.gov/research/ia_research/"> @@ -2208,7 +2261,7 @@ alt="Patch Symbol" title="This person contributed code that improved Android sec <div style="LINE-HEIGHT:25px;"> -<p>Collin Mulliner of <a href="http://www.mulliner.org/collin/academic">MUlliNER.ORG</a> (<a href="https://twitter.com/collinrm">@collinrm</a>)</p> +<p>Collin Mulliner of <a href="http://www.mulliner.org/collin/academic">MUlliNER.ORG</a> (<a href="https://twitter.com/collinrm">@collinrm</a>)</p> </div> @@ -2216,9 +2269,9 @@ alt="Patch Symbol" title="This person contributed code that improved Android sec <div style="LINE-HEIGHT:25px;"> -<p>Charlie Miller (<a href="https://twitter.com/0xcharlie">@0xcharlie</a>)</p> +<p>Charlie Miller (<a href="https://twitter.com/0xcharlie">@0xcharlie</a>)</p> -<p>Collin Mulliner of <a href="http://www.mulliner.org/collin/academic">MUlliNER.ORG</a> (<a href="https://twitter.com/collinrm">@collinrm</a>)</p> +<p>Collin Mulliner of <a href="http://www.mulliner.org/collin/academic">MUlliNER.ORG</a> (<a href="https://twitter.com/collinrm">@collinrm</a>)</p> </div> diff --git a/en/setup/build/initializing.html b/en/setup/build/initializing.html index c68f0773..24c697ff 100644 --- a/en/setup/build/initializing.html +++ b/en/setup/build/initializing.html @@ -159,7 +159,7 @@ environment</h2> You will need a 64-bit version of Ubuntu. Ubuntu 14.04 is recommended. </p> <pre class="devsite-terminal devsite-click-to-copy"> -sudo apt-get install git-core gnupg flex bison gperf build-essential zip curl zlib1g-dev gcc-multilib g++-multilib libc6-dev-i386 lib32ncurses5-dev x11proto-core-dev libx11-dev lib32z-dev ccache libgl1-mesa-dev libxml2-utils xsltproc unzip +sudo apt-get install git-core gnupg flex bison gperf build-essential zip curl zlib1g-dev gcc-multilib g++-multilib libc6-dev-i386 lib32ncurses5-dev x11proto-core-dev libx11-dev lib32z-dev libgl1-mesa-dev libxml2-utils xsltproc unzip </pre> <aside class="note"><strong>Note:</strong> To use SELinux tools for policy analysis, also install the <code>python-networkx</code> package. diff --git a/en/setup/build/requirements.html b/en/setup/build/requirements.html index 0a1f4259..36df7fed 100644 --- a/en/setup/build/requirements.html +++ b/en/setup/build/requirements.html @@ -38,8 +38,7 @@ on 32-bit systems. </li> <li>At least 100GB of free disk space to checkout the code and an extra 150GB - to build it. If you conduct multiple builds or employ ccache, you will need - even more space. + to build it. If you conduct multiple builds, you will need even more space. </li> <li>If you are running Linux in a virtual machine, you need at least 16GB of RAM/swap. diff --git a/en/setup/start/build-numbers.html b/en/setup/start/build-numbers.html index fb2f2d39..6889f568 100644 --- a/en/setup/start/build-numbers.html +++ b/en/setup/start/build-numbers.html @@ -235,6 +235,30 @@ following table. </thead> <tbody> <tr> + <td>OPM4.171019.016.C1</td> + <td>android-8.1.0_r29</td> + <td>Oreo</td> + <td>Pixel C</td> + </tr> + <tr> + <td>OPM4.171019.016.B1</td> + <td>android-8.1.0_r28</td> + <td>Oreo</td> + <td>Pixel XL, Pixel, Pixel 2 XL, Pixel 2</td> + </tr> + <tr> + <td>OPM4.171019.016.A1</td> + <td>android-8.1.0_r27</td> + <td>Oreo</td> + <td>Nexus 5X</td> + </tr> + <tr> + <td>OPM2.171019.029.B1</td> + <td>android-8.1.0_r26</td> + <td>Oreo</td> + <td>Pixel 2 XL, Pixel 2</td> + </tr> + <tr> <td>OPM4.171019.015.A1</td> <td>android-8.1.0_r23</td> <td>Oreo</td> |