aboutsummaryrefslogtreecommitdiff
path: root/en
diff options
context:
space:
mode:
authorAndroid Partner Docs <noreply@android.com>2018-07-02 22:04:20 -0700
committerClay Murphy <claym@google.com>2018-07-02 22:54:25 -0700
commitae1a64f7c44664473c34f98bd1cf7f73308e5690 (patch)
tree16e1c81c8fcc762e3ed21fd67f59cf0d64d3be5c /en
parent0f8b4d96661fce8e3d83deaa0283b6745e5fcf0f (diff)
downloadsource.android.com-ae1a64f7c44664473c34f98bd1cf7f73308e5690.tar.gz
Docs: Changes to source.android.com
- 203064863 Devsite localized content from translation request 946904. by Android Partner Docs <noreply@android.com> - 203031181 Add 2018-07 tags. by Android Partner Docs <noreply@android.com> - 202968884 July 2018 Android and Pixel bulletins by Danielle Roberts <daroberts@google.com> - 202968311 Devsite localized content from translation request 946303. by Android Partner Docs <noreply@android.com> - 202968298 Devsite localized content from translation request 941622. by Android Partner Docs <noreply@android.com> - 202968290 Devsite localized content from translation request 946301. by Android Partner Docs <noreply@android.com> - 202658249 Devsite localized content from translation request 940578. by Android Partner Docs <noreply@android.com> PiperOrigin-RevId: 203064863 Change-Id: I26b77840ecd900e26a274cd59fe3c686778fd81e
Diffstat (limited to 'en')
-rw-r--r--en/security/_toc.yaml4
-rw-r--r--en/security/bulletin/2018-07-01.html698
-rw-r--r--en/security/bulletin/2018.html16
-rw-r--r--en/security/bulletin/index.html17
-rw-r--r--en/security/bulletin/pixel/2018-07-01.html509
-rw-r--r--en/security/bulletin/pixel/2018.html17
-rw-r--r--en/security/bulletin/pixel/index.html15
-rw-r--r--en/security/overview/acknowledgements.html206
-rw-r--r--en/setup/start/build-numbers.html42
9 files changed, 1440 insertions, 84 deletions
diff --git a/en/security/_toc.yaml b/en/security/_toc.yaml
index bb9d4e02..f21fb735 100644
--- a/en/security/_toc.yaml
+++ b/en/security/_toc.yaml
@@ -47,6 +47,8 @@ toc:
section:
- title: 2018 Bulletins
section:
+ - title: July
+ path: /security/bulletin/2018-07-01
- title: June
path: /security/bulletin/2018-06-01
- title: May
@@ -137,6 +139,8 @@ toc:
path: /security/bulletin/pixel/index
- title: 2018 Bulletins
section:
+ - title: July
+ path: /security/bulletin/pixel/2018-07-01
- title: June
path: /security/bulletin/pixel/2018-06-01
- title: May
diff --git a/en/security/bulletin/2018-07-01.html b/en/security/bulletin/2018-07-01.html
new file mode 100644
index 00000000..c368b104
--- /dev/null
+++ b/en/security/bulletin/2018-07-01.html
@@ -0,0 +1,698 @@
+<html devsite>
+ <head>
+ <title>Android Security Bulletin—July 2018</title>
+ <meta name="project_path" value="/_project.yaml" />
+ <meta name="book_path" value="/_book.yaml" />
+ </head>
+ <body>
+ <!--
+ Copyright 2018 The Android Open Source Project
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ //www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+ -->
+<p><em>Published July 2, 2018</em></p>
+
+<p>
+The Android Security Bulletin contains details of security vulnerabilities
+affecting Android devices. Security patch levels of 2018-07-05 or later address
+all of these issues. To learn how to check a device's security patch level, see
+<a href="https://support.google.com/pixelphone/answer/4457705">Check and update
+your Android version</a>.
+</p>
+<p>
+Android partners are notified of all issues at least a month before publication.
+Source code patches for these issues will be released to the Android Open Source
+Project (AOSP) repository in the next 48 hours. We will revise this bulletin
+with the AOSP links when they are available.
+</p>
+<p>
+The most severe of these issues is a critical security vulnerability in Media
+framework that could enable a remote attacker using a specially crafted file to
+execute arbitrary code within the context of a privileged process. The
+<a href="/security/overview/updates-resources.html#severity">severity
+assessment</a> is based on the effect that exploiting the vulnerability would
+possibly have on an affected device, assuming the platform and service
+mitigations are turned off for development purposes or if successfully bypassed.
+</p>
+<p>
+We have had no reports of active customer exploitation or abuse of these newly
+reported issues. Refer to the
+<a href="#mitigations">Android and Google Play Protect mitigations</a>
+section for details on the
+<a href="/security/enhancements/index.html">Android security platform protections</a>
+and Google Play Protect, which improve the security of the Android platform.
+</p>
+<p class="note">
+<strong>Note:</strong> Information on the latest over-the-air update (OTA) and
+firmware images for Google devices is available in the
+<a href="/security/bulletin/pixel/2018-07-01.html">July 2018
+Pixel&hairsp;/&hairsp;Nexus Security Bulletin</a>.
+</p>
+
+<h2 id="mitigations">Android and Google service mitigations</h2>
+<p>
+This is a summary of the mitigations provided by the
+<a href="/security/enhancements/index.html">Android security platform</a>
+and service protections such as
+<a href="https://www.android.com/play-protect">Google Play Protect</a>.
+These capabilities reduce the likelihood that security vulnerabilities
+could be successfully exploited on Android.
+</p>
+<ul>
+<li>Exploitation for many issues on Android is made more difficult by
+enhancements in newer versions of the Android platform. We encourage all users
+to update to the latest version of Android where possible.</li>
+<li>The Android security team actively monitors for abuse through
+<a href="https://www.android.com/play-protect">Google Play Protect</a>
+and warns users about
+<a href="/security/reports/Google_Android_Security_PHA_classifications.pdf">Potentially
+Harmful Applications</a>. Google Play Protect is enabled by default on devices
+with <a href="http://www.android.com/gms">Google Mobile Services</a>, and is
+especially important for users who install apps from outside of Google
+Play.</li>
+</ul>
+<h2 id="2018-07-01-details">2018-07-01 security patch level vulnerability details</h2>
+<p>
+In the sections below, we provide details for each of the security
+vulnerabilities that apply to the 2018-07-01 patch level. Vulnerabilities are
+grouped under the component that they affect. There is a description of the
+issue and a table with the CVE, associated references,
+<a href="#type">type of vulnerability</a>,
+<a href="/security/overview/updates-resources.html#severity">severity</a>,
+and updated AOSP versions (where applicable). When available, we link the public
+change that addressed the issue to the bug ID, like the AOSP change list. When
+multiple changes relate to a single bug, additional references are linked to
+numbers following the bug ID.
+</p>
+
+<h3 id="framework">Framework</h3>
+<p>The most severe vulnerability in this section could enable a remote attacker
+using a specially crafted pac file to execute arbitrary code within the context
+of a privileged process.</p>
+
+<table>
+ <col width="21%">
+ <col width="21%">
+ <col width="14%">
+ <col width="14%">
+ <col width="30%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2018-9433</td>
+ <td>A-38196219</td>
+ <td>RCE</td>
+ <td>Critical</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9410</td>
+ <td>A-77822336</td>
+ <td>ID</td>
+ <td>High</td>
+ <td>8.0, 8.1</td>
+ </tr>
+</table>
+
+
+<h3 id="media-framework">Media framework</h3>
+<p>The most severe vulnerability in this section could enable a remote attacker
+using a specially crafted file to execute arbitrary code within the context of
+a privileged process.</p>
+
+<table>
+ <col width="21%">
+ <col width="21%">
+ <col width="14%">
+ <col width="14%">
+ <col width="30%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2018-9411</td>
+ <td>A-79376389</td>
+ <td>RCE</td>
+ <td>Critical</td>
+ <td>8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9424</td>
+ <td>A-76221123</td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9428</td>
+ <td>A-74122779</td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9412</td>
+ <td>A-78029004</td>
+ <td>DoS</td>
+ <td>High</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9421</td>
+ <td>A-77237570</td>
+ <td>ID</td>
+ <td>High</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+</table>
+
+
+<h3 id="system">System</h3>
+<p>The most severe vulnerability in this section could enable a remote attacker
+using a specially crafted file to execute arbitrary code within the context of
+a privileged process.</p>
+
+<table>
+ <col width="21%">
+ <col width="21%">
+ <col width="14%">
+ <col width="14%">
+ <col width="30%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2018-9365</td>
+ <td>A-74121126</td>
+ <td>RCE</td>
+ <td>Critical</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9432</td>
+ <td>A-73173182</td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9420</td>
+ <td>A-77238656</td>
+ <td>ID</td>
+ <td>High</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9419</td>
+ <td>A-74121659</td>
+ <td>ID</td>
+ <td>High</td>
+ <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+</table>
+
+
+<h2 id="2018-07-05-details">2018-07-05 security patch level vulnerability details</h2>
+<p>
+In the sections below, we provide details for each of the security
+vulnerabilities that apply to the 2018-07-05 patch level. Vulnerabilities are
+grouped under the component that they affect and include details such as the
+CVE, associated references, <a href="#type">type of vulnerability</a>,
+<a href="/security/overview/updates-resources.html#severity">severity</a>,
+component (where applicable), and updated AOSP versions (where applicable). When
+available, we link the public change that addressed the issue to the bug ID,
+like the AOSP change list. When multiple changes relate to a single bug,
+additional references are linked to numbers following the bug ID.
+</p>
+
+<h3 id="kernel-components">Kernel components</h3>
+<p>The most severe vulnerability in this section could enable a local malicious
+application to execute arbitrary code within the context of a privileged
+process.</p>
+
+<table>
+ <col width="21%">
+ <col width="21%">
+ <col width="14%">
+ <col width="14%">
+ <col width="30%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2018-5703</td>
+ <td>A-73543437<br>
+ <a href="https://patchwork.ozlabs.org/patch/801530/">Upstream kernel</a></td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>IPV6 stack</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9422</td>
+ <td>A-74250718<br>
+ <a href="https://patchwork.kernel.org/patch/8265111/">Upstream kernel</a></td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>futex</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9417</td>
+ <td>A-74447444*<br>
+ Upstream kernel<a href="#asterisk">*</a></td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>USB driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-6927</td>
+ <td>A-76106267<br>
+ <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a">Upstream kernel</a></td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>futex</td>
+ </tr>
+</table>
+
+
+<h3 id="qualcomm-components">Qualcomm components</h3>
+<p>The most severe vulnerability in this section could enable a proximate
+attacker using a specially crafted file to execute arbitrary code within the
+context of a privileged process.</p>
+
+<table>
+ <col width="21%">
+ <col width="21%">
+ <col width="14%">
+ <col width="14%">
+ <col width="30%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+<tr>
+ <td>CVE-2018-5872</td>
+ <td>A-77528138<br>
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qca-wifi-host-cmn/commit/?id=7d65c1b32df795d4e95cdf2cfb624126f5125220">QC-CR#2183014</a></td>
+ <td>RCE</td>
+ <td>Critical</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5855</td>
+ <td>A-77527719<br>
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qca-wifi-host-cmn/commit/?id=61f4a467177afc23bdc1944ec61e52bed156c104">QC-CR#2181685</a></td>
+ <td>ID</td>
+ <td>High</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-13077, CVE-2017-13078</td>
+ <td>A-78285557<br>
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=5c671a69c57ce4fd84f0eaf082b336a49d0cf5dd">QC-CR#2133114</a></td>
+ <td>ID</td>
+ <td>High</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5873</td>
+ <td>A-77528487<br>
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=34742aaf7cb16c95edba4a7afed6d2c4fa7e434b">QC-CR#2166382</a></td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>nsfs</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5838</td>
+ <td>A-63146462<a href="#asterisk">*</a><br>
+ QC-CR#2151011</td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>OpenGL ES driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-3586</td>
+ <td>A-63165135<a href="#asterisk">*</a><br>
+ QC-CR#2139538<br>
+ QC-CR#2073777</td>
+ <td>RCE</td>
+ <td>High</td>
+ <td>ADSPRPC heap manager</td>
+ </tr>
+</table>
+
+
+<h3 id="qualcomm-closed-source-components">Qualcomm closed-source components</h3>
+<p>These vulnerabilities affect Qualcomm components and are described in
+further detail in the appropriate Qualcomm AMSS security bulletin or security
+alert. The severity assessment of these issues is provided directly by Qualcomm.</p>
+
+<table>
+ <col width="21%">
+ <col width="21%">
+ <col width="14%">
+ <col width="14%">
+ <col width="30%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-18171</td>
+ <td>A-78240792<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>Critical</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-18277</td>
+ <td>A-78240715<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-18172</td>
+ <td>A-78240449<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-18170</td>
+ <td>A-78240612<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-15841</td>
+ <td>A-78240794<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-18173</td>
+ <td>A-78240199<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-18278</td>
+ <td>A-78240071<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2016-2108</td>
+ <td>A-78240736<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>Critical</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-18275</td>
+ <td>A-78242049<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-18279</td>
+ <td>A-78241971<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-18274</td>
+ <td>A-78241834<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-18276</td>
+ <td>A-78241375<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-18131</td>
+ <td>A-68989823<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-11259</td>
+ <td>A-72951265<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>Critical</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-11258</td>
+ <td>A-72951054<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-11257</td>
+ <td>A-74235874<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>Critical</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5837</td>
+ <td>A-74236406<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5876</td>
+ <td>A-77485022<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>Critical</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5875</td>
+ <td>A-77485183<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>Critical</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5874</td>
+ <td>A-77485139<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>Critical</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5882</td>
+ <td>A-77483830<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5878</td>
+ <td>A-77484449<a href="#asterisk">*</a></td>
+ <td>N/A</td>
+ <td>High</td>
+ <td>Closed-source component</td>
+ </tr>
+</table>
+
+<h2 id="common-questions-and-answers">Common questions and answers</h2>
+<p>This section answers common questions that may occur after reading this bulletin.</p>
+<p><strong>1. How do I determine if my device is updated to address these issues?</strong></p>
+<p>To learn how to check a device's security patch level, see
+<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Check
+and update your Android version</a>.</p>
+<ul>
+<li>Security patch levels of 2018-07-01 or later address all issues associated
+with the 2018-07-01 security patch level.</li>
+<li>Security patch levels of 2018-07-05 or later address all issues associated
+with the 2018-07-05 security patch level and all previous patch levels.</li>
+</ul>
+<p>Device manufacturers that include these updates should set the patch string level to:</p>
+<ul>
+ <li>[ro.build.version.security_patch]:[2018-07-01]</li>
+ <li>[ro.build.version.security_patch]:[2018-07-05]</li>
+</ul>
+<p><strong>2. Why does this bulletin have two security patch levels?</strong></p>
+<p>
+This bulletin has two security patch levels so that Android partners have the
+flexibility to fix a subset of vulnerabilities that are similar across all
+Android devices more quickly. Android partners are encouraged to fix all issues
+in this bulletin and use the latest security patch level.
+</p>
+<ul>
+<li>Devices that use the 2018-07-01 security patch level must include all issues
+associated with that security patch level, as well as fixes for all issues
+reported in previous security bulletins.</li>
+<li>Devices that use the security patch level of 2018-07-05 or newer must
+include all applicable patches in this (and previous) security
+bulletins.</li>
+</ul>
+<p>
+Partners are encouraged to bundle the fixes for all issues they are addressing
+in a single update.
+</p>
+<p id="type">
+<strong>3. What do the entries in the <em>Type</em> column mean?</strong>
+</p>
+<p>
+Entries in the <em>Type</em> column of the vulnerability details table reference
+the classification of the security vulnerability.
+</p>
+<table>
+ <col width="25%">
+ <col width="75%">
+ <tr>
+ <th>Abbreviation</th>
+ <th>Definition</th>
+ </tr>
+ <tr>
+ <td>RCE</td>
+ <td>Remote code execution</td>
+ </tr>
+ <tr>
+ <td>EoP</td>
+ <td>Elevation of privilege</td>
+ </tr>
+ <tr>
+ <td>ID</td>
+ <td>Information disclosure</td>
+ </tr>
+ <tr>
+ <td>DoS</td>
+ <td>Denial of service</td>
+ </tr>
+ <tr>
+ <td>N/A</td>
+ <td>Classification not available</td>
+ </tr>
+</table>
+<p>
+<strong>4. What do the entries in the <em>References</em> column mean?</strong>
+</p>
+<p>
+Entries under the <em>References</em> column of the vulnerability details table
+may contain a prefix identifying the organization to which the reference value belongs.
+</p>
+<table>
+ <col width="25%">
+ <col width="75%">
+ <tr>
+ <th>Prefix</th>
+ <th>Reference</th>
+ </tr>
+ <tr>
+ <td>A-</td>
+ <td>Android bug ID</td>
+ </tr>
+ <tr>
+ <td>QC-</td>
+ <td>Qualcomm reference number</td>
+ </tr>
+ <tr>
+ <td>M-</td>
+ <td>MediaTek reference number</td>
+ </tr>
+ <tr>
+ <td>N-</td>
+ <td>NVIDIA reference number</td>
+ </tr>
+ <tr>
+ <td>B-</td>
+ <td>Broadcom reference number</td>
+ </tr>
+</table>
+<p id="asterisk">
+<strong>5. What does a * next to the Android bug ID in the <em>References</em>
+column mean?</strong>
+</p>
+<p>
+Issues that are not publicly available have a * next to the Android bug ID in
+the <em>References</em> column. The update for that issue is generally contained
+in the latest binary drivers for Pixel&hairsp;/&hairsp;Nexus devices available from the
+<a href="https://developers.google.com/android/drivers">Google Developer site</a>.
+</p>
+<p>
+<strong>6. Why are security vulnerabilities split between this bulletin and
+device/partner security bulletins, such as the Pixel&hairsp;/&hairsp;Nexus bulletin?</strong>
+</p>
+<p>
+Security vulnerabilities that are documented in this security bulletin are
+required in order to declare the latest security patch level on Android devices.
+Additional security vulnerabilities that are documented in the
+device&hairsp;/&hairsp;partner security bulletins are not required for declaring
+a security patch level. Android device and chipset manufacturers are encouraged
+to document the presence of other fixes on their devices through their own security
+websites, such as the
+<a href="https://security.samsungmobile.com/securityUpdate.smsb">Samsung</a>,
+<a href="https://lgsecurity.lge.com/security_updates.html">LGE</a>, or
+<a href="/security/bulletin/pixel/">Pixel&hairsp;/&hairsp;Nexus</a>
+security bulletins.
+</p>
+<h2 id="versions">Versions</h2>
+<table>
+ <col width="25%">
+ <col width="25%">
+ <col width="50%">
+ <tr>
+ <th>Version</th>
+ <th>Date</th>
+ <th>Notes</th>
+ </tr>
+ <tr>
+ <td>1.0</td>
+ <td>July 2, 2018</td>
+ <td>Bulletin published.</td>
+ </tr>
+</table>
+</body></html>
+
diff --git a/en/security/bulletin/2018.html b/en/security/bulletin/2018.html
index 5fc185d6..23d7f45f 100644
--- a/en/security/bulletin/2018.html
+++ b/en/security/bulletin/2018.html
@@ -37,6 +37,22 @@ of all bulletins, see the <a href="/security/bulletin/index.html">Android Securi
<th>Security patch level</th>
</tr>
<tr>
+ <td><a href="/security/bulletin/2018-07-01.html">July 2018</a></td>
+ <td>Coming soon
+ <!--
+ <a href="/security/bulletin/2018-07-01.html">English</a>&nbsp;/
+ <a href="/security/bulletin/2018-07-01.html?hl=ja">日本語</a>&nbsp;/
+ <a href="/security/bulletin/2018-07-01.html?hl=ko">한국어</a>&nbsp;/
+ <a href="/security/bulletin/2018-07-01.html?hl=ru">ру́сский</a>&nbsp;/
+ <a href="/security/bulletin/2018-07-01.html?hl=zh-cn">中文&nbsp;(中国)</a>&nbsp;/
+ <a href="/security/bulletin/2018-07-01.html?hl=zh-tw">中文&nbsp;(台灣)</a>
+ -->
+ </td>
+ <td>July 2, 2018</td>
+ <td>2018-07-01<br>
+ 2018-07-05</td>
+ </tr>
+ <tr>
<td><a href="/security/bulletin/2018-06-01.html">June 2018</a></td>
<td>
<a href="/security/bulletin/2018-06-01.html">English</a>&nbsp;/
diff --git a/en/security/bulletin/index.html b/en/security/bulletin/index.html
index 17d6cc2e..68baf356 100644
--- a/en/security/bulletin/index.html
+++ b/en/security/bulletin/index.html
@@ -69,6 +69,22 @@ Android Open Source Project (AOSP), the upstream Linux kernel, and system-on-chi
<th>Security patch level</th>
</tr>
<tr>
+ <td><a href="/security/bulletin/2018-07-01.html">July 2018</a></td>
+ <td>Coming soon
+ <!--
+ <a href="/security/bulletin/2018-07-01.html">English</a>&nbsp;/
+ <a href="/security/bulletin/2018-07-01.html?hl=ja">日本語</a>&nbsp;/
+ <a href="/security/bulletin/2018-07-01.html?hl=ko">한국어</a>&nbsp;/
+ <a href="/security/bulletin/2018-07-01.html?hl=ru">ру́сский</a>&nbsp;/
+ <a href="/security/bulletin/2018-07-01.html?hl=zh-cn">中文&nbsp;(中国)</a>&nbsp;/
+ <a href="/security/bulletin/2018-07-01.html?hl=zh-tw">中文&nbsp;(台灣)</a>
+ -->
+ </td>
+ <td>July 2, 2018</td>
+ <td>2018-07-01<br>
+ 2018-07-05</td>
+ </tr>
+ <tr>
<td><a href="/security/bulletin/2018-06-01.html">June 2018</a></td>
<td>
<a href="/security/bulletin/2018-06-01.html">English</a>&nbsp;/
@@ -81,6 +97,7 @@ Android Open Source Project (AOSP), the upstream Linux kernel, and system-on-chi
<td>June 4, 2018</td>
<td>2018-06-01<br>
2018-06-05</td>
+ </tr>
<tr>
<td><a href="/security/bulletin/2018-05-01.html">May 2018</a></td>
<td>
diff --git a/en/security/bulletin/pixel/2018-07-01.html b/en/security/bulletin/pixel/2018-07-01.html
new file mode 100644
index 00000000..9adab9c2
--- /dev/null
+++ b/en/security/bulletin/pixel/2018-07-01.html
@@ -0,0 +1,509 @@
+<html devsite>
+ <head>
+ <title>Pixel&hairsp;/&hairsp;Nexus Security Bulletin—July 2018</title>
+ <meta name="project_path" value="/_project.yaml" />
+ <meta name="book_path" value="/_book.yaml" />
+ </head>
+ <body>
+ <!--
+ Copyright 2018 The Android Open Source Project
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ //www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+ -->
+
+<p><em>Published July 2, 2018</em></p>
+
+<p>
+The Pixel&hairsp;/&hairsp;Nexus Security Bulletin contains details of security
+vulnerabilities and functional improvements affecting
+<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">supported
+Google Pixel and Nexus devices</a> (Google devices).
+For Google devices, security patch levels of 2018-07-05 or later address all
+issues in this bulletin and all issues in the July 2018 Android Security
+Bulletin. To learn how to check a device's security patch level, see
+<a href="https://support.google.com/pixelphone/answer/4457705">Check & update your
+Android version</a>.
+</p>
+<p>
+All supported Google devices will receive an update to the 2018-07-05 patch
+level. We encourage all customers to accept these updates to their devices.
+</p>
+<p class="note">
+<strong>Note:</strong> The Google device firmware images are available on the
+<a href="https://developers.google.com/android/images">Google Developer
+site</a>.
+</p>
+
+<h2 id="announcements">Announcements</h2>
+<p>In addition to the security vulnerabilities described in the July 2018
+Android Security Bulletin, Pixel and Nexus devices also contain patches for the
+security vulnerabilities described below. Partners were notified of these issues
+at least a month ago and may choose to incorporate them as part of their device
+updates.</p>
+
+<h2 id="security-patches">Security patches</h2>
+<p>
+Vulnerabilities are grouped under the component that they affect. There is a
+description of the issue and a table with the CVE, associated references,
+<a href="#type">type of vulnerability</a>,
+<a href="https://source.android.com/security/overview/updates-resources.html#severity">severity</a>,
+and updated Android Open Source Project (AOSP) versions (where applicable). When
+available, we link the public change that addressed the issue to the bug ID,
+like the AOSP change list. When multiple changes relate to a single bug,
+additional references are linked to numbers following the bug ID.
+</p>
+
+<h3 id="framework">Framework</h3>
+
+<table>
+ <col width="21%">
+ <col width="21%">
+ <col width="14%">
+ <col width="14%">
+ <col width="30%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2018-9426</td>
+ <td>A-79148652</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9376</td>
+ <td>A-69981755</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9434</td>
+ <td>A-29833520</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+</table>
+
+
+<h3 id="media-framework">Media framework</h3>
+
+<table>
+ <col width="21%">
+ <col width="21%">
+ <col width="14%">
+ <col width="14%">
+ <col width="30%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2018-9429</td>
+ <td>A-73927042</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9423</td>
+ <td>A-77599438</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+</table>
+
+
+<h3 id="system">System</h3>
+
+<table>
+ <col width="21%">
+ <col width="21%">
+ <col width="14%">
+ <col width="14%">
+ <col width="30%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2018-9413</td>
+ <td>A-73782082</td>
+ <td>RCE</td>
+ <td>Moderate</td>
+ <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9418</td>
+ <td>A-73824150</td>
+ <td>RCE</td>
+ <td>Moderate</td>
+ <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9430</td>
+ <td>A-73963551</td>
+ <td>RCE</td>
+ <td>Moderate</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9414</td>
+ <td>A-78787521</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-9431</td>
+ <td>A-77600924</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>8.0, 8.1</td>
+ </tr>
+</table>
+
+
+<h3 id="kernel-components">Kernel components</h3>
+
+<table>
+ <col width="21%">
+ <col width="21%">
+ <col width="14%">
+ <col width="14%">
+ <col width="30%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2018-9416</td>
+ <td>A-75300370<a href="#asterisk">*</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>SCSI driver</td>
+ </tr>
+
+ <tr>
+ <td>CVE-2018-9415</td>
+ <td>A-69129004<br>
+ <a href="https://patchwork.kernel.org/patch/9946759/">Upstream kernel</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>AMBA driver</td>
+ </tr>
+
+ <tr>
+ <td>CVE-2018-7995</td>
+ <td>A-77694092<br>
+<a href="https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b3b7c4795ccab5be71f080774c45bbbcc75c2aaf">Upstream kernel</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>mcheck</td>
+ </tr>
+
+ <tr>
+ <td>CVE-2018-1065</td>
+ <td>A-76206188<br>
+<a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=57ebd808a97d7c5b1e1afb937c2db22beba3c1f8">Upstream kernel</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>netfilter</td>
+ </tr>
+
+ <tr>
+ <td>CVE-2017-1821</td>
+ <td>A-76874268<br>
+<a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2">Upstream kernel</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Ethernet</td>
+ </tr>
+
+ <tr>
+ <td>CVE-2017-1000</td>
+ <td>A-68806309<br>
+<a href="https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=85f1bd9a7b5a79d5baa8bf44af19658f7bf77bfa">Upstream kernel</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Linux kernel</td>
+ </tr>
+</table>
+
+
+<h3 id="qualcomm-components">Qualcomm components</h3>
+
+<table>
+ <col width="21%">
+ <col width="21%">
+ <col width="14%">
+ <col width="14%">
+ <col width="30%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2018-5865</td>
+ <td>A-77528512<br>
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=8fb4202e3bb8cfbbb9f9f0e8695891c9971cfcc2">QC-CR#2179937</a></td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>fwlog</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5864</td>
+ <td>A-77528805<br>
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9c042f7827e0d21e5b93c04b418bca0230de91dc">QC-CR#2170392</a></td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WMA</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-11304</td>
+ <td>A-73242483<a href="#asterisk">*</a><br>
+ QC-CR#2209291</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Sound driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5907</td>
+ <td>A-72710411<a href="#asterisk">*</a><br>
+ QC-CR#2209291</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>sound driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5862</td>
+ <td>A-77528300<br>
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=41ad3f76792e08a84962a0b8e9cfb1ba6c4c9ca6">QC-CR#2153343</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5859</td>
+ <td>A-77527701<br>
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=36400a7fa3753028a3bf89a9cdb28c5e25693c59">QC-CR#2146486</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Video driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-5858</td>
+ <td>A-77528653<br>
+ <a href="https://source.codeaurora.org/quic/la/platform/vendor/opensource/audio-kernel/commit/?id=78193fa06b267c1d6582e5e6f9fb779cf067015e">QC-CR#2174725</a>
+ [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=cd1f0cdd4715e8eae4066bd34df2eef4cf94bd7f">2</a>]</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Audio</td>
+ </tr>
+ <tr>
+ <td>CVE-2018-3570</td>
+ <td>A-72956998<br>
+ <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=5f3b521525689671f2925a49121d0abe28a0a398">QC-CR#2149165</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>cpuidle driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-15851</td>
+ <td>A-38258851<a href="#asterisk">*</a><br>
+ QC-CR#2078155</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Camerav2</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-0606</td>
+ <td>A-34088848<a href="#asterisk">*</a><br>
+ QC-CR#2148210<br>
+ QC-CR#2022490</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>/dev/voice_svc driver</td>
+ </tr>
+</table>
+
+<h2 id="functional-patches">Functional patches</h2>
+<p>
+These updates are included for affected Pixel devices to address functionality
+issues not related to the security of Pixel devices. The table includes
+associated references; the affected category, such as Bluetooth or mobile data;
+improvements; and affected devices.
+</p>
+
+<table>
+ <tr>
+ <th>References</th>
+ <th>Category</th>
+ <th>Improvements</th>
+ <th>Devices</th>
+ </tr>
+ <tr>
+ <td>A-73204553</td>
+ <td>Connectivity</td>
+ <td>Improve consistency of Wi-Fi connections with certain routers</td>
+ <td>Pixel 2, Pixel 2 XL</td>
+ </tr>
+</table>
+
+<h2 id="common-questions-and-answers">Common questions and answers</h2>
+<p>
+This section answers common questions that may occur after reading this
+bulletin.
+</p>
+<p>
+<strong>1. How do I determine if my device is updated to address these issues?
+</strong>
+</p>
+<p>
+Security patch levels of 2018-07-05 or later address all issues associated with
+the 2018-07-05 security patch level and all previous patch levels. To learn how
+to check a device's security patch level, read the instructions on the <a
+href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
+and Nexus update schedule</a>.
+</p>
+<p id="type">
+<strong>2. What do the entries in the <em>Type</em> column mean?</strong>
+</p>
+<p>
+Entries in the <em>Type</em> column of the vulnerability details table reference
+the classification of the security vulnerability.
+</p>
+<table>
+ <col width="25%">
+ <col width="75%">
+ <tr>
+ <th>Abbreviation</th>
+ <th>Definition</th>
+ </tr>
+ <tr>
+ <td>RCE</td>
+ <td>Remote code execution</td>
+ </tr>
+ <tr>
+ <td>EoP</td>
+ <td>Elevation of privilege</td>
+ </tr>
+ <tr>
+ <td>ID</td>
+ <td>Information disclosure</td>
+ </tr>
+ <tr>
+ <td>DoS</td>
+ <td>Denial of service</td>
+ </tr>
+ <tr>
+ <td>N/A</td>
+ <td>Classification not available</td>
+ </tr>
+</table>
+<p>
+<strong>3. What do the entries in the <em>References</em> column mean?</strong>
+</p>
+<p>
+Entries under the <em>References</em> column of the vulnerability details table
+may contain a prefix identifying the organization to which the reference value
+belongs.
+</p>
+<table>
+ <col width="25%">
+ <col width="75%">
+ <tr>
+ <th>Prefix</th>
+ <th>Reference</th>
+ </tr>
+ <tr>
+ <td>A-</td>
+ <td>Android bug ID</td>
+ </tr>
+ <tr>
+ <td>QC-</td>
+ <td>Qualcomm reference number</td>
+ </tr>
+ <tr>
+ <td>M-</td>
+ <td>MediaTek reference number</td>
+ </tr>
+ <tr>
+ <td>N-</td>
+ <td>NVIDIA reference number</td>
+ </tr>
+ <tr>
+ <td>B-</td>
+ <td>Broadcom reference number</td>
+ </tr>
+</table>
+<p id="asterisk">
+<strong>4. What does a * next to the Android bug ID in the <em>References</em>
+column mean?</strong>
+</p>
+<p>
+Issues that are not publicly available have a * next to the Android bug ID in
+the <em>References</em> column. The update for that issue is generally contained
+in the latest binary drivers for Pixel&hairsp;/&hairsp;Nexus devices available
+from the <a href="https://developers.google.com/android/nexus/drivers">Google
+Developer site</a>.
+</p>
+<p>
+<strong>5. Why are security vulnerabilities split between this bulletin and the
+Android Security Bulletins?</strong>
+</p>
+<p>
+Security vulnerabilities that are documented in the Android Security Bulletins
+are required in order to declare the latest security patch level on Android
+devices. Additional security vulnerabilities, such as those documented in this
+bulletin are not required for declaring a security patch level.
+</p>
+<h2 id="versions">Versions</h2>
+<table>
+ <col width="25%">
+ <col width="25%">
+ <col width="50%">
+ <tr>
+ <th>Version</th>
+ <th>Date</th>
+ <th>Notes</th>
+ </tr>
+ <tr>
+ <td>1.0</td>
+ <td>July 2, 2018</td>
+ <td>Bulletin published.</td>
+ </tr>
+</table>
+
+ </body>
+</html>
+
diff --git a/en/security/bulletin/pixel/2018.html b/en/security/bulletin/pixel/2018.html
index f78661eb..f41c9438 100644
--- a/en/security/bulletin/pixel/2018.html
+++ b/en/security/bulletin/pixel/2018.html
@@ -39,6 +39,21 @@ Bulletins</a> homepage.</p>
<th>Security patch level</th>
</tr>
<tr>
+ <td><a href="/security/bulletin/pixel/2018-07-01.html">July 2018</a></td>
+ <td>Coming soon
+ <!--
+ <a href="/security/bulletin/pixel/2018-07-01.html">English</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2018-07-01.html?hl=ja">日本語</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2018-07-01.html?hl=ko">한국어</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2018-07-01.html?hl=ru">ру́сский</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2018-07-01.html?hl=zh-cn">中文&nbsp;(中国)</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2018-07-01.html?hl=zh-tw">中文&nbsp;(台灣)</a>
+ -->
+ </td>
+ <td>July 2, 2018</td>
+ <td>2018-07-05</td>
+ </tr>
+ <tr>
<td><a href="/security/bulletin/pixel/2018-06-01.html">June 2018</a></td>
<td>
<a href="/security/bulletin/pixel/2018-06-01.html">English</a>&nbsp;/
@@ -84,9 +99,7 @@ Bulletins</a> homepage.</p>
<a href="/security/bulletin/pixel/2018-03-01.html?hl=ja">日本語</a>&nbsp;/
<a href="/security/bulletin/pixel/2018-03-01.html?hl=ko">한국어</a>&nbsp;/
<a href="/security/bulletin/pixel/2018-03-01.html?hl=ru">ру́сский</a>&nbsp;/
- <!--
<a href="/security/bulletin/pixel/2018-03-01.html?hl=zh-cn">中文&nbsp;(中国)</a>&nbsp;/
- -->
<a href="/security/bulletin/pixel/2018-03-01.html?hl=zh-tw">中文&nbsp;(台灣)</a>
</td>
<td>March 2018</td>
diff --git a/en/security/bulletin/pixel/index.html b/en/security/bulletin/pixel/index.html
index 3d7100a8..146f4b33 100644
--- a/en/security/bulletin/pixel/index.html
+++ b/en/security/bulletin/pixel/index.html
@@ -59,6 +59,21 @@ AOSP 24&ndash;48 hours after the Pixel&hairsp;/&hairsp;Nexus bulletin is release
<th>Security patch level</th>
</tr>
<tr>
+ <td><a href="/security/bulletin/pixel/2018-07-01.html">July 2018</a></td>
+ <td>Coming soon
+ <!--
+ <a href="/security/bulletin/pixel/2018-07-01.html">English</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2018-07-01.html?hl=ja">日本語</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2018-07-01.html?hl=ko">한국어</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2018-07-01.html?hl=ru">ру́сский</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2018-07-01.html?hl=zh-cn">中文&nbsp;(中国)</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2018-07-01.html?hl=zh-tw">中文&nbsp;(台灣)</a>
+ -->
+ </td>
+ <td>July 2, 2018</td>
+ <td>2018-07-05</td>
+ </tr>
+ <tr>
<td><a href="/security/bulletin/pixel/2018-06-01.html">June 2018</a></td>
<td>
<a href="/security/bulletin/pixel/2018-06-01.html">English</a>&nbsp;/
diff --git a/en/security/overview/acknowledgements.html b/en/security/overview/acknowledgements.html
index a3934fee..5db2794e 100644
--- a/en/security/overview/acknowledgements.html
+++ b/en/security/overview/acknowledgements.html
@@ -37,6 +37,85 @@ Rewards</a> program.</p>
<p>In 2018, the security acknowledgements are listed by month. In prior years,
acknowledgements were listed together.</p>
+<h4 id="july-2018">July</h4>
+ <table>
+ <col width="70%">
+ <col width="30%">
+ <tr>
+ <th>Researchers</th>
+ <th>CVEs</th>
+ </tr>
+ <tr>
+ <td>Baozeng Ding (丁保增)
+ (<a href="https://twitter.com/sploving1">&#64;sploving</a>)
+ of Pandora Lab, Ali Security</td>
+ <td>CVE-2018-9422</td>
+ </tr>
+ <tr>
+ <td>Billy Lau of Android Security Research</td>
+ <td>CVE-2018-9416</td>
+ </tr>
+ <tr>
+ <td>Cusas of L.O. Team</td>
+ <td>CVE-2018-9412</td>
+ </tr>
+ <tr>
+ <td>En He (<a href="https://twitter.com/heeeeen4x">&#64;heeeeen4x</a>) and
+ Bo Liu of <a href="http://www.ms509.com">MS509Team</a></td>
+ <td>CVE-2018-9432, CVE-2018-9414</td>
+ </tr>
+ <tr>
+ <td>Guang Gong of Alpha Team, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2018-9433</td>
+ </tr>
+ <tr>
+ <td>Jann Horn of Google Project Zero</td>
+ <td>CVE-2018-9434</td>
+ </tr>
+ <tr>
+ <td>Jianjun Dai (<a href="https://twitter.com/Jioun_dai">&#64;Jioun_dai</a>) and
+ Guang Gong (<a href="https://twitter.com/oldfresher">&#64;oldfresher</a>)
+ of Alpha Team, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2018-9418, CVE-2018-9413, CVE-2018-9365</td>
+ </tr>
+ <tr>
+ <td>Nathan Crandall (<a href="https://twitter.com/natecray">&#64;natecray</a>)
+ of Tesla's Product Security Team</td>
+ <td>CVE-2017-0606</td>
+ </tr>
+ <tr>
+ <td>niky1235 (<a href="mailto:jiych.guru&#64;gmail.com">jiych.guru&#64;gmail.com</a>,
+ <a href="https://twitter.com/jiych_guru">&#64;jiych_guru</a>)</td>
+ <td>CVE-2018-9423</td>
+ </tr>
+ <tr>
+ <td>Scott Bauer
+ (<a href="https://twitter.com/ScottyBauer1">&#64;ScottyBauer1</a>)</td>
+ <td>CVE-2018-9430</td>
+ </tr>
+ <tr>
+ <td>Tamir Zahavi-Brunner
+ <a href="https://twitter.com/tamir_zb">(&#64;tamir_zb</a>)
+ of Zimperium zLabs Team</td>
+ <td>CVE-2018-9411</td>
+ </tr>
+ <tr>
+ <td>Tencent Blade Team</td>
+ <td>CVE-2018-9421, CVE-2018-9420</td>
+ </tr>
+ <tr>
+ <td>Yonggang Guo (<a href="https://twitter.com/guoygang">&#64;guoygang</a>)
+ of IceSword Lab, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2018-9415</td>
+ </tr>
+ <tr>
+ <td>Zinuo Han (<a href="http://weibo.com/ele7enxxh">weibo.com/ele7enxxh</a>)
+ of Chengdu Security Response Center, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2018-9410, CVE-2018-9424, CVE-2018-9431</td>
+ </tr>
+</table>
+
+
<h4 id="june-2018">June</h4>
<table>
<col width="70%">
@@ -46,32 +125,26 @@ acknowledgements were listed together.</p>
<th>CVEs</th>
</tr>
<tr>
- <td>Baozeng Ding (丁保增) (<a href="https://twitter.com/sploving1">@sploving1</a>),
- Pandora Lab of Ali Security
- </td>
- <td>CVE-2018-5857, CVE-2018-9389
- </td>
+ <td>Baozeng Ding (丁保增) (<a href="https://twitter.com/sploving1">&#64;sploving1</a>)
+ of Pandora Lab, Ali Security</td>
+ <td>CVE-2018-5857, CVE-2018-9389</td>
</tr>
<tr>
- <td>Daniel Kachakil of IOActive
- </td>
- <td>CVE-2018-9375
- </td>
+ <td>Daniel Kachakil of IOActive</td>
+ <td>CVE-2018-9375</td>
</tr>
<tr>
- <td>Elphet and Gong Guang of Alpha Team, Qihoo 360 Technology Co. Ltd.
- </td>
- <td>CVE-2018-9348
- </td>
+ <td>Elphet and Gong Guang of Alpha Team, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2018-9348</td>
</tr>
<tr>
<td>Hao Chen and Guang Gong of Alpha Team, Qihoo 360 Technology Co. Ltd.</td>
- <td>CVE-2018-5899
- </td>
+ <td>CVE-2018-5899</td>
</tr>
<tr>
- <td>Jianjun Dai (<a href="https://twitter.com/Jioun_dai">@Jioun_dai</a>) and Guang Gong
- (<a href="https://twitter.com/oldfresher">@oldfresher</a>) of Alpha Team,<br />
+ <td>Jianjun Dai (<a href="https://twitter.com/Jioun_dai">&#64;Jioun_dai</a>)
+ and Guang Gong
+ (<a href="https://twitter.com/oldfresher">&#64;oldfresher</a>) of Alpha Team,
Qihoo 360 Technology Co. Ltd</td>
<td>CVE-2018-9381, CVE-2018-9358,<br />
CVE-2018-9359, CVE-2018-9360,<br />
@@ -79,110 +152,79 @@ acknowledgements were listed together.</p>
CVE-2018-9356</td>
</tr>
<tr>
- <td>joe0x20@gmail.com
- </td>
- <td>CVE-2018-5898
- </td>
+ <td>joe0x20&#64;gmail.com</td>
+ <td>CVE-2018-5898</td>
</tr>
<tr>
<td><a href="https://www.linkedin.com/in/jose-maria-ariel-martinez-juarez-7910a189/">
- Jose Martinez</a>
- </td>
- <td>CVE-2018-5146
- </td>
+ Jose Martinez</a></td>
+ <td>CVE-2018-5146</td>
</tr>
<tr>
- <td>Julien Thomas (<a href="https://twitter.com/julien_thomas">@Julien_Thomas</a>) of
- <a href="http://protektoid.com/">Protektoid.com</a>
- </td>
- <td>CVE-2018-9374
- </td>
+ <td>Julien Thomas (<a href="https://twitter.com/julien_thomas">&#64;Julien_Thomas</a>)
+ of <a href="http://protektoid.com/">Protektoid.com</a></td>
+ <td>CVE-2018-9374</td>
</tr>
<tr>
- <td><a href="https://github.com/michalbednarski">Michał Bednarski</a>
- </td>
- <td>CVE-2018-9339
- </td>
+ <td><a href="https://github.com/michalbednarski">Michał Bednarski</a></td>
+ <td>CVE-2018-9339</td>
</tr>
<tr>
<td>Mingjian Zhou (周明建)
- (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>)
- of C0RE Team
- </td>
- <td>CVE-2018-9344
- </td>
+ (<a href="https://twitter.com/Mingjian_Zhou">&#64;Mingjian_Zhou</a>)
+ of C0RE Team</td>
+ <td>CVE-2018-9344</td>
</tr>
<tr>
- <td>Niky1235 (<a href="https://twitter.com/jiych_guru">@jiych_guru</a>)
- </td>
- <td>CVE-2017-13230, CVE-2018-9347
- </td>
+ <td>Niky1235 (<a href="https://twitter.com/jiych_guru">&#64;jiych_guru</a>)</td>
+ <td>CVE-2017-13230, CVE-2018-9347</td>
</tr>
<tr>
<td>Pengfei Ding (丁鹏飞), Chenfu Bao (包沉浮), and Lenx Wei (韦韬)<br />
- of Baidu X-Lab (百度安全实验室)
- </td>
- <td>CVE-2018-5832
- </td>
+ of Baidu X-Lab (百度安全实验室)</td>
+ <td>CVE-2018-5832</td>
</tr>
<tr>
- <td>Qing Dong of 360 Beaconlab
- </td>
- <td>CVE-2018-9386
- </td>
+ <td>Qing Dong of 360 Beaconlab</td>
+ <td>CVE-2018-9386</td>
</tr>
<tr>
- <td>Scott Bauer (<a href="https://twitter.com/ScottyBauer1">@ScottyBauer1</a>)
- </td>
+ <td>Scott Bauer (<a href="https://twitter.com/ScottyBauer1">&#64;ScottyBauer1</a>)</td>
<td>CVE-2018-9388, CVE-2018-9355,<br />
- CVE-2018-9380
- </td>
+ CVE-2018-9380</td>
</tr>
<tr>
<td><a href="https://github.com/stze">Stephan Zeisberg</a> of
- <a href="https://srlabs.de/">Security Research Labs</a>
- </td>
+ <a href="https://srlabs.de/">Security Research Labs</a></td>
<td>CVE-2018-9350, CVE-2018-9352,<br />
- CVE-2018-9353, CVE-2018-9341
- </td>
+ CVE-2018-9353, CVE-2018-9341</td>
</tr>
<tr>
- <td>Tencent Blade Team
- </td>
- <td>CVE-2018-9345, CVE-2018-9346
- </td>
+ <td>Tencent Blade Team</td>
+ <td>CVE-2018-9345, CVE-2018-9346</td>
</tr>
<tr>
- <td>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>)
- of IceSword Lab, Qihoo 360 Technology Co. Ltd.
- </td>
- <td>CVE-2017-0564
- </td>
+ <td>Yonggang Guo (<a href="https://twitter.com/guoygang">&#64;guoygang</a>)
+ of IceSword Lab, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2017-0564</td>
</tr>
<tr>
- <td>Yuan-Tsung Lo of C0RE Team
- </td>
- <td>CVE-2017-13079, CVE-2017-13081
- </td>
+ <td>Yuan-Tsung Lo of C0RE Team</td>
+ <td>CVE-2017-13079, CVE-2017-13081</td>
</tr>
<tr>
- <td>华为移动安全实验室的钱育波
- </td>
- <td>CVE-2018-9363
- </td>
+ <td>华为移动安全实验室的钱育波</td>
+ <td>CVE-2018-9363</td>
</tr>
<tr>
<td>Zinuo Han of Chengdu Security Response Center,
- Qihoo 360 Technology Co. Ltd.
- </td>
+ Qihoo 360 Technology Co. Ltd.</td>
<td>CVE-2018-9340, CVE-2018-9338,<br />
- CVE-2018-9378
- </td>
+ CVE-2018-9378</td>
</tr>
</table>
-
- <h4 id="may-2018">May</h4>
+<h4 id="may-2018">May</h4>
<table>
<col width="70%">
<col width="30%">
diff --git a/en/setup/start/build-numbers.html b/en/setup/start/build-numbers.html
index 842d8f1a..13536d4e 100644
--- a/en/setup/start/build-numbers.html
+++ b/en/setup/start/build-numbers.html
@@ -235,6 +235,48 @@ following table.
</thead>
<tbody>
<tr>
+ <td>OPM6.171019.030.E1</td>
+ <td>android-8.1.0_r41</td>
+ <td>Oreo</td>
+ <td>Nexus 5X and Nexus 6P</td>
+ </tr>
+ <tr>
+ <td>OPM4.171019.021.R1</td>
+ <td>android-8.1.0_r40</td>
+ <td>Oreo</td>
+ <td>Pixel 2 XL</td>
+ </tr>
+ <tr>
+ <td>OPM4.171019.021.Q1</td>
+ <td>android-8.1.0_r39</td>
+ <td>Oreo</td>
+ <td>Pixel 2</td>
+ </tr>
+ <tr>
+ <td>OPM4.171019.021.P1</td>
+ <td>android-8.1.0_r38</td>
+ <td>Oreo</td>
+ <td>Pixel, Pixel XL</td>
+ </tr>
+ <tr>
+ <td>OPM4.171019.021.N1</td>
+ <td>android-8.1.0_r37</td>
+ <td>Oreo</td>
+ <td>Pixel C</td>
+ </tr>
+ <tr>
+ <td>OPM2.171026.006.H1</td>
+ <td>android-8.1.0_r36</td>
+ <td>Oreo</td>
+ <td>Pixel 2 XL</td>
+ </tr>
+ <tr>
+ <td>OPM2.171026.006.G1</td>
+ <td>android-8.1.0_r35</td>
+ <td>Oreo</td>
+ <td>Pixel 2</td>
+ </tr>
+ <tr>
<td>OPM6.171019.030.B1</td>
<td>android-8.1.0_r33</td>
<td>Oreo</td>