aboutsummaryrefslogtreecommitdiff
path: root/en
diff options
context:
space:
mode:
authorAndroid Partner Docs <noreply@android.com>2018-02-13 12:14:30 -0800
committerClay Murphy <claym@google.com>2018-02-13 14:27:14 -0800
commit43777eee371e6f873e7757bbaab25763b7ed1053 (patch)
treee24b37636ab23996b5b08a0f931425269bde43eb /en
parent6db7c1d6346142f8c543dbc79cbfb68639266d0b (diff)
downloadsource.android.com-43777eee371e6f873e7757bbaab25763b7ed1053.tar.gz
Docs: Changes to source.android.com
- 185568049 Typo in the usb adapter spec by Danielle Roberts <daroberts@google.com> - 185454531 Devsite localized content from translation request f937f9... by Android Partner Docs <noreply@android.com> - 185454519 Devsite localized content from translation request 379736... by Android Partner Docs <noreply@android.com> - 185454514 Devsite localized content from translation request 92bc2c... by Android Partner Docs <noreply@android.com> - 185454118 Devsite localized content from translation request fc1572... by Android Partner Docs <noreply@android.com> - 185454110 Devsite localized content from translation request 465ee3... by Android Partner Docs <noreply@android.com> - 185454102 Devsite localized content from translation request ff994d... by Android Partner Docs <noreply@android.com> - 185441660 Devsite localized content from translation request 2d6e3e... by Android Partner Docs <noreply@android.com> - 185441584 Devsite localized content from translation request dcfc8e... by Android Partner Docs <noreply@android.com> - 185197349 Fix typo. by Android Partner Docs <noreply@android.com> - 185069980 fix typo by Android Partner Docs <noreply@android.com> - 185020036 Add example about optimizing kernel initcall by Android Partner Docs <noreply@android.com> - 184942796 Add analog-to-USB-C adapter and USB device spec by Danielle Roberts <daroberts@google.com> - 184900015 Exclude old bulletins from localization by Danielle Roberts <daroberts@google.com> - 184880179 Update Feb 2018 bulletins with AOSP links by Danielle Roberts <daroberts@google.com> PiperOrigin-RevId: 185568049 Change-Id: Id2ddd64fd6d7f29d7d5dee0e900c84b1a69e2a55
Diffstat (limited to 'en')
-rw-r--r--en/_index.yaml14
-rw-r--r--en/devices/_toc-interfaces.yaml24
-rw-r--r--en/devices/accessories/headset/usb-adapter.html112
-rw-r--r--en/devices/accessories/headset/usb-device.html124
-rw-r--r--en/devices/accessories/headset/usb-headset-spec.html118
-rw-r--r--en/devices/tech/ota/index.html2
-rw-r--r--en/devices/tech/perf/boot-times.html6
-rw-r--r--en/security/bulletin/2018-02-01.html78
-rw-r--r--en/security/bulletin/_translation.yaml33
-rw-r--r--en/security/bulletin/pixel/2018-02-01.html106
-rw-r--r--en/security/selinux/device-policy.html2
11 files changed, 432 insertions, 187 deletions
diff --git a/en/_index.yaml b/en/_index.yaml
index 3f4fab67..85acc4bc 100644
--- a/en/_index.yaml
+++ b/en/_index.yaml
@@ -73,6 +73,13 @@ landing_page:
image_path: /images/android_stack.png
- heading: News
items:
+ - heading: February Security Bulletins
+ description: >
+ The February 2018 Android and Pixel/Nexus Security Bulletins have been
+ published to support the February security release.
+ buttons:
+ - label: February 7th, 2018
+ path: /security/bulletin/2018-02-01
- heading: ART DEX bytecode improvements
description: >
Android runtime (ART) now includes bytecode documentation for
@@ -81,13 +88,6 @@ landing_page:
buttons:
- label: January 19th, 2018
path: /devices/tech/dalvik/dalvik-bytecode
- - heading: January Security Bulletins
- description: >
- The January 2018 Android and Pixel/Nexus Security Bulletins have been
- published to support the January security release.
- buttons:
- - label: January 2nd, 2018
- path: /security/bulletin/2018-01-01
- heading: Android 8.1 Instructions
description: >
The Android 8.1 release is now available and offers many new features
diff --git a/en/devices/_toc-interfaces.yaml b/en/devices/_toc-interfaces.yaml
index 74313cbe..dba14fbe 100644
--- a/en/devices/_toc-interfaces.yaml
+++ b/en/devices/_toc-interfaces.yaml
@@ -336,20 +336,24 @@ toc:
section:
- title: Overview
path: /devices/accessories/audio
- - title: Headset
+ - title: 3.5 mm Headset
section:
- - title: Overview
- path: /devices/accessories/headset/
- - title: 3.5 mm Headset Spec
+ - title: Headset Spec
path: /devices/accessories/headset/plug-headset-spec
- - title: 3.5 mm Jack Spec
+ - title: Device Spec
path: /devices/accessories/headset/jack-headset-spec
- - title: USB Headset Spec
+ - title: USB Headset
+ section:
+ - title: Headset Spec
path: /devices/accessories/headset/usb-headset-spec
- - title: Expected Behavior
- path: /devices/accessories/headset/expected-behavior
- - title: Testing
- path: /devices/accessories/headset/testing
+ - title: Adapter Spec
+ path: /devices/accessories/headset/usb-adapter
+ - title: Device Spec
+ path: /devices/accessories/headset/usb-device
+ - title: Expected Behavior
+ path: /devices/accessories/headset/expected-behavior
+ - title: Testing
+ path: /devices/accessories/headset/testing
- title: Custom Accessories
section:
- title: Overview
diff --git a/en/devices/accessories/headset/usb-adapter.html b/en/devices/accessories/headset/usb-adapter.html
new file mode 100644
index 00000000..4b70bc1d
--- /dev/null
+++ b/en/devices/accessories/headset/usb-adapter.html
@@ -0,0 +1,112 @@
+<html devsite>
+ <head>
+ <title>USB-C-to-Analog Audio Adapter</title>
+ <meta name="project_path" value="/_project.yaml" />
+ <meta name="book_path" value="/_book.yaml" />
+ </head>
+ <body>
+ <!--
+ Copyright 2018 The Android Open Source Project
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+ -->
+
+
+
+<p>
+While some new Android phones are being produced without a 3.5 mm jack, users
+may still own 3.5 mm headsets that they want to use with those devices. To
+facilitate that, this article specifies a USB-C-to-analog audio adapter spec to
+plug
+<a href="/devices/accessories/headset/plug-headset-spec.html">3.5 mm headsets</a>
+into devices that only have a
+<a href="/devices/accessories/headset/usb-device">USB-C port</a>.</p>
+<p>
+This documentation specifies the minimum requirements: accessory manufacturers
+are encouraged to add features while keeping these requirements in mind.
+</p>
+
+<h2 id="adapter-type">Adapter type</h2>
+<p>
+Only digital-to-analog adapters are allowed. Analog-only adapters following
+<a href="http://www.usb.org/">USB.org's</a> "USB Type-C Cable and Connector
+Specification, Release 1.2, Appendix A" are not supported.
+</p>
+<h2 id="functional-overview">Functional overview</h2>
+<p>
+The adapter allows users to plug their existing 3.5mm accessories into devices
+with USB-C ports. To do this, the adapter supports:
+</p>
+<ul>
+ <li>Stereo analog devices with and without microphones</li>
+ <li>Digital to analog conversion of 2 output channels</li>
+ <li>Analog to digital conversion of 1 input channel</li>
+ <li>Detection of analog device insertion</li>
+ <li>Detection of headset microphone</li>
+ <li>Detection of output impedance</li>
+ <li>Translation of headset button events to HID events</li>
+</ul>
+
+<h2 id="analog-interface">Analog interface</h2>
+<p>
+The adapter shall not present any UAC interface, playback, or capture endpoints
+to the USB host until a device is inserted and properly identified. Depending on
+the type of device detected, the following UAC terminal types must be reported:
+</p>
+
+<ul>
+ <li><strong>Headphones</strong>. Low impedance transducers, &lt; 1 kiloohm, no
+ microphone: 0x0302</li>
+ <li><strong>Headset</strong>. Low impedance transducers with microphone: 0x0402</li>
+ <li><strong>Line in</strong>. High impedance input: 0x603</li>
+ <li><strong>Line out</strong>. High impedance output: 0x604</li>
+ <li><strong>Line in and Line out</strong> or <strong>Line in and Mic</strong>:
+ 0x400</li>
+</ul>
+
+<h2 id="button-functions">Button functions</h2>
+<p>
+The adapter shall convert button events received from the analog interface and
+conforming to the Android
+<a href="/devices/accessories/headset/plug-headset-spec">analog headset
+specification</a> to the following HID events: </p>
+<table>
+ <tr>
+ <th>Function</th>
+ <th>Mappings</th>
+ </tr>
+ <tr>
+ <td>A</td>
+ <td>HID usage page: 0x0C<br>
+ HID usage: 0x0CD </td>
+ </tr>
+ <tr>
+ <td>B </td>
+ <td>HID usage page: 0x0C<br>
+ HID usage: 0x0E9</td>
+ </tr>
+ <tr>
+ <td>C</td>
+ <td>HID usage page: 0x0C<br>
+ HID usage: 0x0EA</td>
+ </tr>
+ <tr>
+ <td>D </td>
+ <td>HID usage page: 0x0C<br>
+ HID usage: 0x0CF</td>
+ </tr>
+</table>
+
+ </body></html>
+
+
diff --git a/en/devices/accessories/headset/usb-device.html b/en/devices/accessories/headset/usb-device.html
new file mode 100644
index 00000000..4cc73939
--- /dev/null
+++ b/en/devices/accessories/headset/usb-device.html
@@ -0,0 +1,124 @@
+<html devsite>
+ <head>
+ <title>USB Headset: Device Specification</title>
+ <meta name="project_path" value="/_project.yaml" />
+ <meta name="book_path" value="/_book.yaml" />
+ </head>
+ <body>
+ <!--
+ Copyright 2017 The Android Open Source Project
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+ -->
+
+
+
+<p>
+For USB headsets to work seamlessly across the Android ecosystem, Android
+devices must support them uniformly. This documentation specifies USB
+behavior to support USB headsets and adapters across the Android ecosystem.
+</p>
+
+<h2 id="software-mapping">Software mapping</h2>
+<p>
+Compatible USB headsets are required to support compatible HID mappings.
+Device support is required for the following keycode mappings.
+</p>
+
+<table>
+ <tr>
+ <th>Function</th>
+ <th>Mappings</th>
+ <th>Context</th>
+ <th>Behavior</th>
+ </tr>
+ <tr>
+ <td rowspan="6">A</td>
+ <td rowspan="6"><strong>HID usage page</strong>: 0x0C<br>
+ <strong>HID usage</strong>: 0x0CD<br>
+ <strong>Kernel key</strong>: <code>KEY_PLAYPAUSE</code><br>
+ <strong>Android key</strong>: <code>KEYCODE_MEDIA_PLAY_PAUSE</code></td>
+ <td rowspan="2">Media playback</td>
+ <td><strong>Input</strong>: Short press<br>
+ <strong>Output</strong>: Play or pause</td>
+ </tr>
+ <tr>
+ <td><strong>Input</strong>: Long press<br>
+ <strong>Output</strong>: Launch voice command<br>
+ <strong>Sends</strong>:
+ <code>android.speech.action.VOICE_SEARCH_HANDS_FREE</code> if the device
+ is locked or its screen is off. Sends
+ <code>android.speech.RecognizerIntent.ACTION_WEB_SEARCH</code> otherwise</td>
+ </tr>
+ <tr>
+ <td rowspan="2">Incoming call</td>
+ <td><strong>Input</strong>: Short press<br>
+ <strong>Output</strong>: Accept call</td>
+ </tr>
+ <tr>
+ <td><strong>Input</strong>: Long press<br>
+ <strong>Output</strong>: Reject call</td>
+ </tr>
+ <tr>
+ <td rowspan="2">Ongoing call</td>
+ <td><strong>Input</strong>: Short press<br>
+ <strong>Output</strong>: End call</td>
+ </tr>
+ <tr>
+ <td><strong>Input</strong>: Long press<br>
+ <strong>Output</strong>: Mute or unmute microphone</td>
+ </tr>
+ <tr>
+ <td>B</td>
+ <td><strong>HID usage page</strong>: 0x0C<br>
+ <strong>HID usage</strong>: 0x0E9<br>
+ <strong>Kernel key</strong>: <code>KEY_VOLUMEUP</code><br>
+ <strong>Android key</strong>: <code>VOLUME_UP</code></td>
+ <td>Media playback, Ongoing call</td>
+ <td><strong>Input</strong>: Short or long press<br>
+ <strong>Output</strong>: Increases the system or headset volume</td>
+ </tr>
+ <tr>
+ <td>C</td>
+ <td><strong>HID usage page</strong>: 0x0C<br>
+ <strong>HID usage</strong>: 0x0EA<br>
+ <strong>Kernel key</strong>: <code>KEY_VOLUMEDOWN</code><br>
+ <strong>Android key</strong>: <code>VOLUME_DOWN</code></td>
+ <td>Media playback, Ongoing call</td>
+ <td><strong>Input</strong>: Short or long press<br>
+ <strong>Output</strong>: Decreases the system or headset volume</td>
+ </tr>
+ <tr>
+ <td>D</td>
+ <td><strong>HID usage page</strong>: 0x0C<br>
+ <strong>HID usage</strong>: 0x0CF<br>
+ <strong>Kernel key</strong>: <code>KEY_VOICECOMMAND</code><br>
+ <strong>Android key</strong>: <code>KEYCODE_VOICE_ASSIST</code></td>
+ <td>All. Can be triggered in any instance.</td>
+ <td><strong>Input</strong>: Short or long press<br>
+ <strong>Output</strong>: Launch voice command</td>
+ </tr>
+</table>
+
+<h2 id="mechanical">Mechanical</h2>
+<p>
+Device manufacturers should also consult the
+<a href="/devices/audio/usb.html">USB Digital Audio</a> page for more
+information about USB implementation on Android.
+Device manufacturers must also follow the requirements in the
+<a href="/compatibility/android-cdd.html#7_7_usb">USB section</a> of
+the Android CDD.
+</p>
+
+ </body>
+</html>
diff --git a/en/devices/accessories/headset/usb-headset-spec.html b/en/devices/accessories/headset/usb-headset-spec.html
index 3279eee1..9302fe09 100644
--- a/en/devices/accessories/headset/usb-headset-spec.html
+++ b/en/devices/accessories/headset/usb-headset-spec.html
@@ -24,25 +24,34 @@
<p>
-This documentation specifies USB headset buttons behavior to function uniformly
-across the Android ecosystem. Device manufacturers should also consult the
-<a href="/devices/audio/usb.html">USB
-Digital Audio</a> page for more information about USB implementation on Android
-and the <a href="/compatibility/android-cdd.html">Android Compatibility
-Definition Document (CDD)</a> for requirements related to Android devices.
-</p>
-<p>There are also specifications for
-<a href="plug-headset-spec.html">3.5 mm headsets</a> for accessory manufacturers and
-<a href="jack-headset-spec.html">3.5 mm jacks</a> for device manufacturers.
+This documentation specifies some characteristics of USB headsets, so that
+they function uniformly across the Android ecosystem. Only headsets with
+digital USB audio interface are permitted. Purely analog headsets with
+mechanical adaptation to USB-C are not permitted, as per USB Type-C
+specification.
</p>
<p>
This documentation specifies the minimum requirements: accessory manufacturers
are encouraged to add features while keeping these requirements in mind.
</p>
-<h2 id="control-function-mapping">Control-function mapping</h2>
+
+<h2 id="functional-overview">Functional overview</h2>
+<p>
+USB headsets can implement a variety of basic and advanced features. This
+specification only covers mandated basic features:
+</p>
+<ul>
+ <li>Stereo output</li>
+ <li>Optional, but recommended, microphone</li>
+ <li>Function buttons for volume, playback, and call control</li>
+</ul>
+
+<h2 id="control-function">Control functions</h2>
+<p>Headsets can come with varying number of buttons to control specific
+functions, such as volume and play/pause.<p>
<table>
<tr>
- <th>Control Function</th>
+ <th>Control function</th>
<th>Accessory Support</th>
<th>Description</th>
</tr>
@@ -92,82 +101,34 @@ on a second key press).
<h2 id="software-mapping">Software mapping</h2>
<p>
Compatible USB headsets are required to support the following software mappings
-for the headset buttons. Device support is required for the following software
-mappings.
+for the headset buttons. Devices match these HID mappings with the appropriate
+Android keycode.
</p>
<table>
<tr>
<th>Function</th>
<th>Mappings</th>
- <th>Context</th>
- <th>Behavior</th>
- </tr>
- <tr>
- <td rowspan="6">A</td>
- <td rowspan="6"><strong>HID usage page</strong>: 0x0C<br>
- <strong>HID usage</strong>: 0x0CD<br>
- <strong>Kernel key</strong>: <code>KEY_PLAYPAUSE</code><br>
- <strong>Android key</strong>: <code>KEYCODE_MEDIA_PLAY_PAUSE</code></td>
- <td rowspan="2">Media playback</td>
- <td><strong>Input</strong>: Short press<br>
- <strong>Output</strong>: Play or pause</td>
- </tr>
- <tr>
- <td><strong>Input</strong>: Long press<br>
- <strong>Output</strong>: Launch voice command<br>
- <strong>Sends</strong>:
- <code>android.speech.action.VOICE_SEARCH_HANDS_FREE</code> if the device
- is locked or its screen is off. Sends
- <code>android.speech.RecognizerIntent.ACTION_WEB_SEARCH</code> otherwise</td>
- </tr>
- <tr>
- <td rowspan="2">Incoming call</td>
- <td><strong>Input</strong>: Short press<br>
- <strong>Output</strong>: Accept call</td>
</tr>
<tr>
- <td><strong>Input</strong>: Long press<br>
- <strong>Output</strong>: Reject call</td>
- </tr>
- <tr>
- <td rowspan="2">Ongoing call</td>
- <td><strong>Input</strong>: Short press<br>
- <strong>Output</strong>: End call</td>
- </tr>
- <tr>
- <td><strong>Input</strong>: Long press<br>
- <strong>Output</strong>: Mute or unmute microphone</td>
+ <td>A</td>
+ <td>HID usage page: 0x0C<br>
+ HID usage: 0x0CD </td>
</tr>
<tr>
- <td>B</td>
- <td><strong>HID usage page</strong>: 0x0C<br>
- <strong>HID usage</strong>: 0x0E9<br>
- <strong>Kernel key</strong>: <code>KEY_VOLUMEUP</code><br>
- <strong>Android key</strong>: <code>VOLUME_UP</code></td>
- <td>Media playback, Ongoing call</td>
- <td><strong>Input</strong>: Short or long press<br>
- <strong>Output</strong>: Increases the system or headset volume</td>
+ <td>B </td>
+ <td>HID usage page: 0x0C<br>
+ HID usage: 0x0E9</td>
</tr>
<tr>
<td>C</td>
- <td><strong>HID usage page</strong>: 0x0C<br>
- <strong>HID usage</strong>: 0x0EA<br>
- <strong>Kernel key</strong>: <code>KEY_VOLUMEDOWN</code><br>
- <strong>Android key</strong>: <code>VOLUME_DOWN</code></td>
- <td>Media playback, Ongoing call</td>
- <td><strong>Input</strong>: Short or long press<br>
- <strong>Output</strong>: Decreases the system or headset volume</td>
+ <td>HID usage page: 0x0C<br>
+ HID usage: 0x0EA</td>
</tr>
<tr>
- <td>D</td>
- <td><strong>HID usage page</strong>: 0x0C<br>
- <strong>HID usage</strong>: 0x0CF<br>
- <strong>Kernel key</strong>: <code>KEY_VOICECOMMAND</code><br>
- <strong>Android key</strong>: <code>KEYCODE_VOICE_ASSIST</code></td>
- <td>All. Can be triggered in any instance.</td>
- <td><strong>Input</strong>: Short or long press<br>
- <strong>Output</strong>: Launch voice command</td>
+ <td>D </td>
+ <td>HID usage page: 0x0C<br>
+ HID usage: 0x0CF</td>
</tr>
</table>
@@ -176,16 +137,17 @@ collection. For accessories without a microphone, use Headphone (Usage
Page: Consumer (0x0C), Usage: Headphone (0x05)). For accesories with a
microphone, use Headset (Usage Page: Telephony (0x0B), Usage: Headset (0x05)).</p>
+<h2 id="output-level">Output level</h2>
+<p>
+The maximum sound pressure level shall comply to any regulatory requirement in
+the country of destination.
+</p>
+
<h2 id="mechanical">Mechanical</h2>
<p>
Accessory manufacturers must follow the requirements for USB connectors
as specified by <a href="http://www.usb.org/">USB.org</a>.
</p>
-<p>
-Device manufacturers must follow the requirements in the
-<a href="/compatibility/android-cdd.html#7_7_usb">USB section</a> of
-the Android CDD.
-</p>
</body>
</html>
diff --git a/en/devices/tech/ota/index.html b/en/devices/tech/ota/index.html
index 7b7db75f..1565e3b2 100644
--- a/en/devices/tech/ota/index.html
+++ b/en/devices/tech/ota/index.html
@@ -43,7 +43,7 @@
running but idle. A/B devices do not need space to download the update
package because they can apply the update as they read it from the
network. This is called <em>streaming A/B</em>. A/B updates are also
- know as <em>seamless updates</em>. For more information about OTA
+ known as <em>seamless updates</em>. For more information about OTA
updates for A/B devices, see
<a href="/devices/tech/ota/ab/index.html">A/B (Seamless) System
Updates
diff --git a/en/devices/tech/perf/boot-times.html b/en/devices/tech/perf/boot-times.html
index e74ef1fc..a7588301 100644
--- a/en/devices/tech/perf/boot-times.html
+++ b/en/devices/tech/perf/boot-times.html
@@ -260,6 +260,12 @@ start init process, then delay those peripherals/components until later
in the boot process.
</p>
+<pre
+class="prettyprint">
+BoardConfig-common.mk:
+ BOARD_KERNEL_CMDLINE += initcall_debug ignore_loglevel
+</pre>
+
<h2 id="optimizing-i-o-efficiency">Optimizing I/O efficiency</h2>
<p>
diff --git a/en/security/bulletin/2018-02-01.html b/en/security/bulletin/2018-02-01.html
index 2b479ed8..67509dfb 100644
--- a/en/security/bulletin/2018-02-01.html
+++ b/en/security/bulletin/2018-02-01.html
@@ -20,7 +20,7 @@
See the License for the specific language governing permissions and
limitations under the License.
-->
- <p><em>Published February 5, 2018</em></p>
+ <p><em>Published February 5, 2018 | February 7, 2018</em></p>
<p>
@@ -32,10 +32,9 @@ your Android version</a>.
</p>
<p>
Android partners are notified of all issues at least a month before publication.
-Source code patches for these issues will be released to the Android Open Source
-Project (AOSP) repository in the next 48 hours. We will revise this bulletin
-with the AOSP links when they are available.
-</p>
+Source code patches for these issues have been released to the Android Open
+Source Project (AOSP) repository and linked from this bulletin. This bulletin
+also includes links to patches outside of AOSP.</p>
<p>
The most severe of these issues is a critical security vulnerability in Media
framework that could enable a remote attacker using a specially crafted file to
@@ -115,28 +114,34 @@ a privileged process.</p>
</tr>
<tr>
<td>CVE-2017-13228</td>
- <td>A-69478425</td>
+ <td><a href="https://android.googlesource.com/platform/external/libavc/+/04b68a0a51729b655bcd0f5ae5ec20645eeda946">
+ A-69478425</a></td>
<td>RCE</td>
<td>Critical</td>
<td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
</tr>
<tr>
<td>CVE-2017-13231</td>
- <td>A-67962232</td>
+ <td><a href="https://android.googlesource.com/platform/hardware/interfaces/+/16a3cd0b0729bd53265897cf8c790013156e92ce">
+ A-67962232</a>
+ </td>
<td>EoP</td>
<td>High</td>
<td>8.0, 8.1</td>
</tr>
<tr>
<td>CVE-2017-13232</td>
- <td>A-68953950</td>
+ <td><a href="https://android.googlesource.com/platform/frameworks/av/+/6a5d1fc7cbccd85054e56542a633149622effa67">
+ A-68953950</a>
+ </td>
<td>ID</td>
<td>High</td>
<td>5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
</tr>
<tr>
<td rowspan="2">CVE-2017-13230</td>
- <td rowspan="2">A-65483665</td>
+ <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libhevc/+/68e532d83a1b98f6b5e297d71b547ed93a68dfe3">
+ A-65483665</a></td>
<td>DoS</td>
<td>High</td>
<td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
@@ -148,14 +153,18 @@ a privileged process.</p>
</tr>
<tr>
<td>CVE-2017-13233</td>
- <td>A-62851602</td>
+ <td><a href="https://android.googlesource.com/platform/external/libhevc/+/a22314db4e0cfe11ef3e50dac6a13d52f7a595b3">
+ A-62851602</a>
+ </td>
<td>DoS</td>
<td>High</td>
<td>5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
</tr>
<tr>
<td>CVE-2017-13234</td>
- <td>A-68159767</td>
+ <td><a href="https://android.googlesource.com/platform/external/sonivox/+/33f45caed3b60bf81790e9b76cf82c8e8d6ed902">
+ A-68159767</a>
+ </td>
<td>DoS</td>
<td>High</td>
<td>5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
@@ -182,7 +191,10 @@ application to execute commands normally limited to privileged processes.</p>
</tr>
<tr>
<td>CVE-2017-13236</td>
- <td>A-68217699</td>
+ <td><a href="https://android.googlesource.com/platform/system/security/+/80592e62a6ae095041e95b811ad7066dd44d37f6">
+ A-68217699</a>
+ [<a href="https://android.googlesource.com/platform/system/security/+/b49160023ee8f73ce0ac97f9f4604a34ebdecf76">2</a>]
+ </td>
<td>EoP</td>
<td>Moderate</td>
<td>8.0, 8.1</td>
@@ -342,11 +354,9 @@ a privileged process.</p>
<tr>
<td>CVE-2017-15817</td>
<td>A-68992394<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ba78e506e5002cdae525dd544dbf1df0ccce1ef">
-QC-CR#2076603 [2]</a> [<a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=fe43c2b64ac81199de17efc258e95546cb0546f1">
-2</a>]</td>
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ba78e506e5002cdae525dd544dbf1df0ccce1ef">
+QC-CR#2076603</a>
+ [<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=fe43c2b64ac81199de17efc258e95546cb0546f1">2</a>]</td>
<td>RCE</td>
<td>Critical</td>
<td>WLan</td>
@@ -354,11 +364,9 @@ href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan
<tr>
<td>CVE-2017-17760</td>
<td>A-68992416<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=71331327ac389bff7d5af2707c4325e5b7949013">
-QC-CR#2082544 [2]</a> [<a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a6afff2717791ceb281354833d4489123ae62605">
-2</a>]</td>
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=71331327ac389bff7d5af2707c4325e5b7949013">
+QC-CR#2082544</a>
+ [<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a6afff2717791ceb281354833d4489123ae62605">2</a>]</td>
<td>RCE</td>
<td>Critical</td>
<td>WLan</td>
@@ -382,8 +390,7 @@ href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan
<tr>
<td>CVE-2017-17765</td>
<td>A-68992445<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=66e561b0c7fff54e8cacd87d2b7d9bb3eef4f13b">
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=66e561b0c7fff54e8cacd87d2b7d9bb3eef4f13b">
QC-CR#2115112</a></td>
<td>EoP</td>
<td>High</td>
@@ -392,8 +399,7 @@ QC-CR#2115112</a></td>
<tr>
<td>CVE-2017-17762</td>
<td>A-68992439<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=41ee23cd0972ef2ed47dd76eb7cd44a0268e4f9f">
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=41ee23cd0972ef2ed47dd76eb7cd44a0268e4f9f">
QC-CR#2114426</a></td>
<td>EoP</td>
<td>High</td>
@@ -402,8 +408,7 @@ QC-CR#2114426</a></td>
<tr>
<td>CVE-2017-14884</td>
<td>A-68992429<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0ce15ef4075719a82858b7324690be7011cab832">
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0ce15ef4075719a82858b7324690be7011cab832">
QC-CR#2113052</a></td>
<td>EoP</td>
<td>High</td>
@@ -412,8 +417,7 @@ QC-CR#2113052</a></td>
<tr>
<td>CVE-2017-15829</td>
<td>A-68992397<br />
- <a
-href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=c1b60e554e158bfcf6932ed2c543c309236e0f79">
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=c1b60e554e158bfcf6932ed2c543c309236e0f79">
QC-CR#2097917</a></td>
<td>EoP</td>
<td>High</td>
@@ -422,8 +426,7 @@ QC-CR#2097917</a></td>
<tr>
<td>CVE-2017-15820</td>
<td>A-68992396<br />
- <a
-href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=7599c5b7d87248b4772d6c4b70ccb922704c8095">
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=7599c5b7d87248b4772d6c4b70ccb922704c8095">
QC-CR#2093377</a></td>
<td>EoP</td>
<td>High</td>
@@ -432,8 +435,7 @@ QC-CR#2093377</a></td>
<tr>
<td>CVE-2017-17764</td>
<td>A-68992443<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f451565c052a0322565225515f46be677c0d1b18">
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f451565c052a0322565225515f46be677c0d1b18">
QC-CR#2114789</a></td>
<td>EoP</td>
<td>High</td>
@@ -442,8 +444,7 @@ QC-CR#2114789</a></td>
<tr>
<td>CVE-2017-17761</td>
<td>A-68992434<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=13e3a516935a0dd90a7bc39e51c30c1592c548b7">
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=13e3a516935a0dd90a7bc39e51c30c1592c548b7">
QC-CR#2114187</a></td>
<td>EoP</td>
<td>High</td>
@@ -638,5 +639,10 @@ security bulletins.
<td>February 5, 2018</td>
<td>Bulletin published.</td>
</tr>
+ <tr>
+ <td>1.1</td>
+ <td>February 7, 2018</td>
+ <td>Bulletin revise to include AOSP links.</td>
+ </tr>
</table>
</body></html>
diff --git a/en/security/bulletin/_translation.yaml b/en/security/bulletin/_translation.yaml
index 53f84959..88a35ea5 100644
--- a/en/security/bulletin/_translation.yaml
+++ b/en/security/bulletin/_translation.yaml
@@ -1,3 +1,36 @@
+ignore_paths:
+- /security/bulletin/2017.html
+- /security/bulletin/2017-12-01.html
+- /security/bulletin/2017-11-01.html
+- /security/bulletin/2017-10-01.html
+- /security/bulletin/2017-09-01.html
+- /security/bulletin/2017-08-01.html
+- /security/bulletin/2017-07-01.html
+- /security/bulletin/2017-06-01.html
+- /security/bulletin/2017-05-01.html
+- /security/bulletin/2017-04-01.html
+- /security/bulletin/2017-03-01.html
+- /security/bulletin/2017-02-01.html
+- /security/bulletin/2017-01-01.html
+- /security/bulletin/2016.html
+- /security/bulletin/2016-12-01.html
+- /security/bulletin/2016-11-01.html
+- /security/bulletin/2016-10-01.html
+- /security/bulletin/2016-09-01.html
+- /security/bulletin/2016-08-01.html
+- /security/bulletin/2016-07-01.html
+- /security/bulletin/2016-06-01.html
+- /security/bulletin/2016-05-01.html
+- /security/bulletin/2016-04-02.html
+- /security/bulletin/2016-03-01.html
+- /security/bulletin/2016-02-01.html
+- /security/bulletin/2016-01-01.html
+- /security/bulletin/2015.html
+- /security/bulletin/2015-12-01.html
+- /security/bulletin/2015-11-01.html
+- /security/bulletin/2015-10-01.html
+- /security/bulletin/2015-09-01.html
+- /security/bulletin/2015-08-01.html
enable_continuous_translation: True
title: Android Security Bulletins
description: Translations for Android Security Bulletins
diff --git a/en/security/bulletin/pixel/2018-02-01.html b/en/security/bulletin/pixel/2018-02-01.html
index 695ffd4b..6ebbbb9e 100644
--- a/en/security/bulletin/pixel/2018-02-01.html
+++ b/en/security/bulletin/pixel/2018-02-01.html
@@ -22,7 +22,7 @@
-->
-<p><em>Published February 5, 2018</em></p>
+<p><em>Published February 5, 2018 | Updated February 7, 2018</em></p>
<p>
The Pixel&hairsp;/&hairsp;Nexus Security Bulletin contains details of security
@@ -80,14 +80,16 @@ additional references are linked to numbers following the bug ID.
</tr>
<tr>
<td>CVE-2017-13239</td>
- <td>A-66244132</td>
+ <td>A-66244132<a href="#asterisk">*</a></td>
<td>ID</td>
<td>Moderate</td>
<td>8.0</td>
</tr>
<tr>
<td>CVE-2017-13240</td>
- <td>A-68694819</td>
+ <td><a href="https://android.googlesource.com/platform/frameworks/base/+/5025791ac6d1538224e19189397de8d71dcb1a12">
+ A-68694819</a>
+ </td>
<td>ID</td>
<td>Moderate</td>
<td>8.0, 8.1</td>
@@ -112,14 +114,17 @@ additional references are linked to numbers following the bug ID.
</tr>
<tr>
<td>CVE-2017-13241</td>
- <td>A-69065651</td>
+ <td><a href="https://android.googlesource.com/platform/frameworks/av/+/158af2ed6d9d03ff24fe1d12ea6eb6a7bbcce383">
+ A-69065651</a>
+ </td>
<td>ID</td>
<td>Moderate</td>
<td>5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
</tr>
<tr>
<td rowspan="2">CVE-2017-13229</td>
- <td rowspan="2">A-68160703</td>
+ <td rowspan="2"><a href="https://android.googlesource.com/platform/external/sonivox/+/f3decaa147faaf090a23b65239658a6749a4e80c">
+ A-68160703</a></td>
<td>RCE</td>
<td>Moderate</td>
<td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
@@ -131,7 +136,8 @@ additional references are linked to numbers following the bug ID.
</tr>
<tr>
<td rowspan="2">CVE-2017-13235</td>
- <td rowspan="2">A-68342866</td>
+ <td rowspan="2"><a href="https://android.googlesource.com/platform/frameworks/av/+/28e9a544ef076b5cadb30066b2e283017ad9e3b3">
+ A-68342866</a></td>
<td>NSI</td>
<td>NSI</td>
<td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
@@ -161,14 +167,17 @@ additional references are linked to numbers following the bug ID.
</tr>
<tr>
<td>CVE-2017-13242</td>
- <td>A-62672248</td>
+ <td><a href="https://android.googlesource.com/platform/packages/apps/Settings/+/26e2b2456a444777de114f728c4dc2af88c2fb03">
+ A-62672248</a>
+ [<a href="https://android.googlesource.com/platform/packages/apps/Settings/+/7ed7d00e6028234088b58bf6d6d9362a5effece1">2</a>]
+ </td>
<td>ID</td>
<td>Moderate</td>
<td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
</tr>
<tr>
<td>CVE-2017-13243</td>
- <td>A-38258991</td>
+ <td>A-38258991<a href="#asterisk">*</a></td>
<td>ID</td>
<td>Moderate</td>
<td>5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</td>
@@ -208,8 +217,7 @@ additional references are linked to numbers following the bug ID.
<tr>
<td>CVE-2017-1000405</td>
<td>A-69934280<br />
- <a
-href="https://github.com/torvalds/linux/commit/a8f97366452ed491d13cf1e44241bc0b5740b1f0">
+ <a href="https://github.com/torvalds/linux/commit/a8f97366452ed491d13cf1e44241bc0b5740b1f0">
Upstream kernel</a></td>
<td>EoP</td>
<td>Moderate</td>
@@ -243,8 +251,7 @@ Upstream kernel</a></td>
<tr>
<td>CVE-2017-15859</td>
<td>A-65468985<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d">
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d">
QC-CR#2059715</a></td>
<td>ID</td>
<td>Moderate</td>
@@ -261,8 +268,7 @@ QC-CR#2059715</a></td>
<tr>
<td>CVE-2017-9723</td>
<td>A-68992479<br />
- <a
-href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=e83ebd2098009b0d336ffab11e00f739902bd5d9">
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=e83ebd2098009b0d336ffab11e00f739902bd5d9">
QC-CR#2007828</a></td>
<td>EoP</td>
<td>Moderate</td>
@@ -271,10 +277,9 @@ QC-CR#2007828</a></td>
<tr>
<td>CVE-2017-14881</td>
<td>A-68992478<br />
- <a
-href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=81ea9c34f575422a78015535c619500c34b8a69c">
-QC-CR#2087492</a> [<a
-href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=1e14c7342bbb55f4ff761cf8cb7374750620c903">2</a>]</td>
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=81ea9c34f575422a78015535c619500c34b8a69c">
+QC-CR#2087492</a>
+ [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=1e14c7342bbb55f4ff761cf8cb7374750620c903">2</a>]</td>
<td>EoP</td>
<td>Moderate</td>
<td>ipa driver</td>
@@ -282,10 +287,9 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=1e14c7342
<tr>
<td>CVE-2017-14877</td>
<td>A-68992473<br />
- <a
-href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=ca395c15c49cf6463a39d197b6a9331d183d94cb">
-QC-CR#2057803</a> [<a
-href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c2fd287bf16dc5e9f98145ba91083bdc56dfc01f">2</a>]</td>
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=ca395c15c49cf6463a39d197b6a9331d183d94cb">
+QC-CR#2057803</a>
+ [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c2fd287bf16dc5e9f98145ba91083bdc56dfc01f">2</a>]</td>
<td>EoP</td>
<td>Moderate</td>
<td>ipa driver</td>
@@ -293,10 +297,9 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c2fd287bf
<tr>
<td>CVE-2017-15826</td>
<td>A-68992471<br />
- <a
-href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=5ac3e9d038a7ee7edf77dde2dffae6f8ba528848">
-QC-CR#2100085</a> [<a
-href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=46db8f8292f71d0086140ae90bce5ae8ff161cb1">2</a>]</td>
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=5ac3e9d038a7ee7edf77dde2dffae6f8ba528848">
+QC-CR#2100085</a>
+ [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=46db8f8292f71d0086140ae90bce5ae8ff161cb1">2</a>]</td>
<td>EoP</td>
<td>Moderate</td>
<td>MDSS rotator</td>
@@ -304,8 +307,7 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=46db8f829
<tr>
<td>CVE-2017-14876</td>
<td>A-68992468<br />
- <a
-href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=f26dbd9d9491333766ba383044064b1304127ac0">
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=f26dbd9d9491333766ba383044064b1304127ac0">
QC-CR#2054041</a></td>
<td>EoP</td>
<td>Moderate</td>
@@ -314,8 +316,7 @@ QC-CR#2054041</a></td>
<tr>
<td>CVE-2017-14892</td>
<td>A-68992455<br />
- <a
-href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=a3bed71777c133cfec78b5140877c6ba109961a0">
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=a3bed71777c133cfec78b5140877c6ba109961a0">
QC-CR#2096407</a></td>
<td>EoP</td>
<td>Moderate</td>
@@ -324,8 +325,7 @@ QC-CR#2096407</a></td>
<tr>
<td>CVE-2017-17766</td>
<td>A-68992448<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a37d8a78f5bd0e9a2c91de46721a6d80bd229a43">
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a37d8a78f5bd0e9a2c91de46721a6d80bd229a43">
QC-CR#2115366</a></td>
<td>EoP</td>
<td>Moderate</td>
@@ -334,8 +334,7 @@ QC-CR#2115366</a></td>
<tr>
<td>CVE-2017-15823</td>
<td>A-68992447<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=49c1ce19c8a4689c33e6e8f17ab77d77fae6ff93">
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=49c1ce19c8a4689c33e6e8f17ab77d77fae6ff93">
QC-CR#2115365</a></td>
<td>EoP</td>
<td>Moderate</td>
@@ -352,10 +351,9 @@ QC-CR#2115365</a></td>
<tr>
<td>CVE-2017-15846</td>
<td>A-67713103<br />
- <a
-href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9fdbd92ec9196ba3629f68f4c22342aa6eedc960">
-QC-CR#2083314</a> [<a
-href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9c18cc5551afc7318f57571611252fa80e1753a0">2</a>]</td>
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9fdbd92ec9196ba3629f68f4c22342aa6eedc960">
+QC-CR#2083314</a>
+ [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9c18cc5551afc7318f57571611252fa80e1753a0">2</a>]</td>
<td>EoP</td>
<td>Moderate</td>
<td>Camera</td>
@@ -363,8 +361,7 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9c18cc555
<tr>
<td>CVE-2017-14883</td>
<td>A-68992426<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=3de34af4e2ca91e1a2260deb380b81620a631c85">
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=3de34af4e2ca91e1a2260deb380b81620a631c85">
QC-CR#2112832</a></td>
<td>EoP</td>
<td>Moderate</td>
@@ -373,8 +370,7 @@ QC-CR#2112832</a></td>
<tr>
<td>CVE-2017-11043</td>
<td>A-68992421<br />
- <a
-href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=befd1f713a72b992ee63970b7e3d1d7a32ba5a01">
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=befd1f713a72b992ee63970b7e3d1d7a32ba5a01">
QC-CR#2091584</a></td>
<td>EoP</td>
<td>Moderate</td>
@@ -383,8 +379,7 @@ QC-CR#2091584</a></td>
<tr>
<td>CVE-2017-14875</td>
<td>A-68992465<br />
- <a
-href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=755261330733bb2440907a8407ed691c99451ddc">
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=755261330733bb2440907a8407ed691c99451ddc">
QC-CR#2042147</a></td>
<td>ID</td>
<td>Moderate</td>
@@ -393,8 +388,7 @@ QC-CR#2042147</a></td>
<tr>
<td>CVE-2017-14891</td>
<td>A-68992453<br />
- <a
-href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=736667bf08b03fdca824e88b901c2dbdd6703a0c">
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=736667bf08b03fdca824e88b901c2dbdd6703a0c">
QC-CR#2096006</a></td>
<td>ID</td>
<td>Moderate</td>
@@ -403,8 +397,7 @@ QC-CR#2096006</a></td>
<tr>
<td>CVE-2017-17771</td>
<td>A-38196031<br />
- <a
-href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=a452045792bc09548b4e1b940aa8adfed822b51c">
+ <a href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=a452045792bc09548b4e1b940aa8adfed822b51c">
QC-CR#2003798</a></td>
<td>EoP</td>
<td>Moderate</td>
@@ -467,7 +460,7 @@ and a summary of the issue.
</tr>
<tr>
<td>A-69349260</td>
- <td>App Compatibility</td>
+ <td>App compatibility</td>
<td>Improved RSA key parsing from byte arrays.</td>
<td>All</td>
</tr>
@@ -479,7 +472,7 @@ and a summary of the issue.
</tr>
<tr>
<td>A-69797895</td>
- <td>Mobile Data</td>
+ <td>Mobile data</td>
<td>Improved data performance for Telus users in certain network
environments.</td>
<td>Pixel 2</td>
@@ -511,8 +504,8 @@ bulletin.
<p>
Security patch levels of 2018-02-05 or later address all issues associated with
the 2018-02-05 security patch level and all previous patch levels. To learn how
-to check a device's security patch level, read the instructions on the <a
-href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
+to check a device's security patch level, read the instructions on the
+<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
and Nexus update schedule</a>.
</p>
<p id="type">
@@ -593,8 +586,8 @@ column mean?</strong>
<p>
Issues that are not publicly available have a * next to the Android bug ID in
the <em>References</em> column. The update for that issue is generally contained
-in the latest binary drivers for Nexus devices available from the <a
-href="https://developers.google.com/android/nexus/drivers">Google Developer
+in the latest binary drivers for Nexus devices available from the
+<a href="https://developers.google.com/android/nexus/drivers">Google Developer
site</a>.
</p>
<p>
@@ -622,6 +615,11 @@ bulletin, are not required for declaring a security patch level.
<td>February 5, 2018</td>
<td>Bulletin published.</td>
</tr>
+ <tr>
+ <td>1.1</td>
+ <td>February 7, 2018</td>
+ <td>Bulletin revised to include AOSP links.</td>
+ </tr>
</table>
</body></html>
diff --git a/en/security/selinux/device-policy.html b/en/security/selinux/device-policy.html
index 928a1faa..adfd629e 100644
--- a/en/security/selinux/device-policy.html
+++ b/en/security/selinux/device-policy.html
@@ -240,7 +240,7 @@ windows open:</p>
<p>The intent is clear: everyone but third-party apps may have access to the debug
device. </p>
-<p>The rule is flawed in a few of ways. The exclusion of <code>untrusted_app</code>
+<p>The rule is flawed in a few ways. The exclusion of <code>untrusted_app</code>
is trivial to work around because all apps may optionally run services in the
<code>isolated_app</code> domain. Likewise, if new domains for third-party apps
are added to AOSP, they will also have access to <code>scary_debug_device</code>.