aboutsummaryrefslogtreecommitdiff
path: root/en/security
diff options
context:
space:
mode:
Diffstat (limited to 'en/security')
-rw-r--r--en/security/_toc.yaml134
-rw-r--r--en/security/bulletin/2017-07-01.html15
-rw-r--r--en/security/bulletin/2017-09-01.html9
-rw-r--r--en/security/bulletin/2017-10-01.html507
-rw-r--r--en/security/bulletin/index.html45
-rw-r--r--en/security/bulletin/pixel/2017-10-01.html675
-rw-r--r--en/security/bulletin/pixel/index.html78
-rw-r--r--en/security/overview/acknowledgements.html1133
-rw-r--r--en/security/selinux/index.html124
9 files changed, 2235 insertions, 485 deletions
diff --git a/en/security/_toc.yaml b/en/security/_toc.yaml
index 6a09aa50..f4a56068 100644
--- a/en/security/_toc.yaml
+++ b/en/security/_toc.yaml
@@ -35,70 +35,80 @@ toc:
path: /security/bulletin/
- title: Advisories
path: /security/advisory/
- - title: 2017 Bulletins
+ - title: Android Bulletins
section:
- - title: September
- path: /security/bulletin/2017-09-01
- - title: August
- path: /security/bulletin/2017-08-01
- - title: July
- path: /security/bulletin/2017-07-01
- - title: June
- path: /security/bulletin/2017-06-01
- - title: May
- path: /security/bulletin/2017-05-01
- - title: April
- path: /security/bulletin/2017-04-01
- - title: March
- path: /security/bulletin/2017-03-01
- - title: February
- path: /security/bulletin/2017-02-01
- - title: January
- path: /security/bulletin/2017-01-01
- - title: Index
- path: /security/bulletin/2017
- - title: 2016 Bulletins
+ - title: 2017 Bulletins
+ section:
+ - title: October
+ path: /security/bulletin/2017-10-01
+ - title: September
+ path: /security/bulletin/2017-09-01
+ - title: August
+ path: /security/bulletin/2017-08-01
+ - title: July
+ path: /security/bulletin/2017-07-01
+ - title: June
+ path: /security/bulletin/2017-06-01
+ - title: May
+ path: /security/bulletin/2017-05-01
+ - title: April
+ path: /security/bulletin/2017-04-01
+ - title: March
+ path: /security/bulletin/2017-03-01
+ - title: February
+ path: /security/bulletin/2017-02-01
+ - title: January
+ path: /security/bulletin/2017-01-01
+ - title: Index
+ path: /security/bulletin/2017
+ - title: 2016 Bulletins
+ section:
+ - title: December
+ path: /security/bulletin/2016-12-01
+ - title: November
+ path: /security/bulletin/2016-11-01
+ - title: October
+ path: /security/bulletin/2016-10-01
+ - title: September
+ path: /security/bulletin/2016-09-01
+ - title: August
+ path: /security/bulletin/2016-08-01
+ - title: July
+ path: /security/bulletin/2016-07-01
+ - title: June
+ path: /security/bulletin/2016-06-01
+ - title: May
+ path: /security/bulletin/2016-05-01
+ - title: April
+ path: /security/bulletin/2016-04-02
+ - title: March
+ path: /security/bulletin/2016-03-01
+ - title: February
+ path: /security/bulletin/2016-02-01
+ - title: January
+ path: /security/bulletin/2016-01-01
+ - title: Index
+ path: /security/bulletin/2016
+ - title: 2015 Bulletins
+ section:
+ - title: December
+ path: /security/bulletin/2015-12-01
+ - title: November
+ path: /security/bulletin/2015-11-01
+ - title: October
+ path: /security/bulletin/2015-10-01
+ - title: September
+ path: /security/bulletin/2015-09-01
+ - title: August
+ path: /security/bulletin/2015-08-01
+ - title: Index
+ path: /security/bulletin/2015
+ - title: Pixel/Nexus Bulletins
section:
- - title: December
- path: /security/bulletin/2016-12-01
- - title: November
- path: /security/bulletin/2016-11-01
- - title: October
- path: /security/bulletin/2016-10-01
- - title: September
- path: /security/bulletin/2016-09-01
- - title: August
- path: /security/bulletin/2016-08-01
- - title: July
- path: /security/bulletin/2016-07-01
- - title: June
- path: /security/bulletin/2016-06-01
- - title: May
- path: /security/bulletin/2016-05-01
- - title: April
- path: /security/bulletin/2016-04-02
- - title: March
- path: /security/bulletin/2016-03-01
- - title: February
- path: /security/bulletin/2016-02-01
- - title: January
- path: /security/bulletin/2016-01-01
- - title: Index
- path: /security/bulletin/2016
- - title: 2015 Bulletins
- section:
- - title: December
- path: /security/bulletin/2015-12-01
- - title: November
- path: /security/bulletin/2015-11-01
- - title: October
- path: /security/bulletin/2015-10-01
- - title: September
- path: /security/bulletin/2015-09-01
- - title: August
- path: /security/bulletin/2015-08-01
- - title: Index
- path: /security/bulletin/2015
+ - title: Overview
+ path: /security/bulletin/pixel/index
+ - title: October 2017
+ path: /security/bulletin/pixel/2017-10-01
- title: Application Signing
section:
- title: Overview
diff --git a/en/security/bulletin/2017-07-01.html b/en/security/bulletin/2017-07-01.html
index 7a45b0ec..19141843 100644
--- a/en/security/bulletin/2017-07-01.html
+++ b/en/security/bulletin/2017-07-01.html
@@ -20,7 +20,7 @@
See the License for the specific language governing permissions and
limitations under the License.
-->
-<p><em>Published July 5, 2017 | Updated September 19, 2017</em></p>
+<p><em>Published July 5, 2017 | Updated September 26, 2017</em></p>
<p>The Android Security Bulletin contains details of security vulnerabilities
affecting Android devices. Security patch levels of July 05, 2017 or later
@@ -1465,6 +1465,12 @@ site</a>.</p>
Group</td>
</tr>
<tr>
+ <td>CVE-2017-0681</td>
+ <td><a href="mailto:zc1991@mail.ustc.edu.cn">Chi Zhang</a>,<a href="mailto:arnow117@gmail.com">Hanxiang Wen</a>, Mingjian Zhou (<a
+href="//twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>), and Xuxian Jiang
+of <a href="//c0reteam.org">C0RE Team</a></td>
+ </tr>
+ <tr>
<td>CVE-2017-0706</td>
<td>Daxing Guo (<a href="//twitter.com/freener0">@freener0</a>) of
Xuanwu Lab, Tencent</td>
@@ -1496,7 +1502,7 @@ href="//weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360 Technology Co.
Ltd.</td>
</tr>
<tr>
- <td>CVE-2017-0665, CVE-2017-0681</td>
+ <td>CVE-2017-0665</td>
<td><a href="mailto:arnow117@gmail.com">Hanxiang Wen</a>, Mingjian Zhou (<a
href="//twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>), and Xuxian Jiang
of <a href="//c0reteam.org">C0RE Team</a></td>
@@ -1743,6 +1749,11 @@ site</a>.</p>
<td>September 19, 2017</td>
<td>Updated acknowledgements for CVE-2017-0710.</td>
</tr>
+ <tr>
+ <td>1.5</td>
+ <td>September 26, 2017</td>
+ <td>Updated acknowledgements for CVE-2017-0681.</td>
+ </tr>
</table>
</body>
</html>
diff --git a/en/security/bulletin/2017-09-01.html b/en/security/bulletin/2017-09-01.html
index 5f7fa157..56c94f05 100644
--- a/en/security/bulletin/2017-09-01.html
+++ b/en/security/bulletin/2017-09-01.html
@@ -20,7 +20,7 @@
See the License for the specific language governing permissions and
limitations under the License.
-->
- <p><em>Published September 5, 2017 | Updated September 25, 2017</em></p>
+ <p><em>Published September 5, 2017 | Updated September 28, 2017</em></p>
<p>The Android Security Bulletin contains details of security vulnerabilities
affecting Android devices. Security patch levels of September 05, 2017 or later
@@ -937,7 +937,7 @@ QC-CR#2013236</a></td>
<tr>
<td>CVE-2017-11001</td>
<td>A-36815555<a href="#asterisk">*</a><br />
- QC-CR#270292</td>
+ QC-CR#2051433</td>
<td>ID</td>
<td>Moderate</td>
<td>Wi-Fi driver</td>
@@ -1401,6 +1401,11 @@ CVE-2017-0785 as part of industry-coordinated disclosure.</td>
<td>Added details for CVE-2017-11120 and CVE-2017-11121
as part of industry-coordinated disclosure.</td>
</tr>
+ <tr>
+ <td>1.4</td>
+ <td>September 28, 2017</td>
+ <td>Update vendor reference for CVE-2017-11001.</td>
+ </tr>
</table>
</body>
</html>
diff --git a/en/security/bulletin/2017-10-01.html b/en/security/bulletin/2017-10-01.html
new file mode 100644
index 00000000..6ca5f4f6
--- /dev/null
+++ b/en/security/bulletin/2017-10-01.html
@@ -0,0 +1,507 @@
+<html devsite>
+ <head>
+ <title>Android Security Bulletin—October 2017</title>
+ <meta name="project_path" value="/_project.yaml" />
+ <meta name="book_path" value="/_book.yaml" />
+ </head>
+ <body>
+ <!--
+ Copyright 2017 The Android Open Source Project
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ //www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+ -->
+ <p><em>Published October 2, 2017</em></p>
+
+<p>The Android Security Bulletin contains details of security vulnerabilities
+affecting Android devices. Security patch levels of October 05, 2017 or later
+address all of these issues. To learn how to check a device's security patch
+level, see <a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">
+Check &amp; update your Android version</a>.</p>
+
+<p>Android partners are notified of all issues at least a month before
+publication. Source code patches for these issues will be released
+to the Android Open Source Project (AOSP) repository in the next 48 hours.
+We will revise this bulletin with the AOSP links when they are available.</p>
+
+<p>The most severe of these issues is a critical severity vulnerability in media
+framework that could enable a remote attacker using a specially crafted file to
+execute arbitrary code within the context of a privileged process. The
+<a href="/security/overview/updates-resources.html#severity">severity
+assessment</a> is based on the effect that exploiting the vulnerability would
+possibly have on an affected device, assuming the platform and service
+mitigations are turned off for development purposes or if successfully bypassed.</p>
+
+<p>We have had no reports of active customer exploitation or abuse of these newly
+reported issues. Refer to the
+<a href="#mitigations">Android and Google Play Protect mitigations</a> section
+for details on the <a href="/security/enhancements/index.html">Android
+security platform protections</a> and Google Play Protect, which improve the
+security of the Android platform.</p>
+
+<p>We encourage all customers to accept these updates to their devices.</p>
+
+<p class="note"><strong>Note:</strong> Information on the latest over-the-air
+update (OTA) and firmware images for Google devices is available in the
+<a href="/security/bulletin/pixel/2017-10-01">October 2017
+Pixel&hairsp;/&hairsp;Nexus Security Bulletin</a>.</p>
+
+<h2 id="announcements">Announcements</h2>
+<ul>
+ <li>We have launched a new monthly
+ <a href="/security/bulletin/pixel">Pixel&hairsp;/&hairsp;Nexus Security
+ Bulletin</a>, which contains information on additional security
+ vulnerabilities and functional improvements that are addressed on Pixel and
+ Nexus devices. Android device manufacturers may choose to address these
+ issues on their devices. See <a href="#split">Common questions and
+ answers</a> for additional information</li>
+ <li>Security bulletin acknowledgements are now listed directly in the
+ <a href="/security/overview/acknowledgements.html">Android Security
+ Acknowledgements</a> page.</li>
+</ul>
+
+<h2 id="mitigations">Android and Google service mitigations</h2>
+<p>This is a summary of the mitigations provided by the
+<a href="/security/enhancements/index.html">Android security platform</a>
+and service protections such as
+<a href="https://www.android.com/play-protect">Google Play Protect</a>. These
+capabilities reduce the likelihood that security vulnerabilities could be
+successfully exploited on Android.</p>
+<ul>
+ <li>Exploitation for many issues on Android is made more difficult by
+ enhancements in newer versions of the Android platform. We encourage all users
+ to update to the latest version of Android where possible.</li>
+ <li>The Android security team actively monitors for abuse through <a
+ href="https://www.android.com/play-protect">Google Play Protect</a> and warns
+ users about <a
+ href="/security/reports/Google_Android_Security_PHA_classifications.pdf">Potentially
+ Harmful Applications</a>. Google Play Protect is enabled by default on devices
+ with <a href="http://www.android.com/gms">Google Mobile Services</a>, and is
+ especially important for users who install apps from outside of Google
+ Play.</li>
+</ul>
+<h2 id="2017-10-01-details">2017-10-01 security patch level—Vulnerability details</h2>
+<p>In the sections below, we provide details for each of the security
+vulnerabilities that apply to the 2017-10-01 patch level. Vulnerabilities are
+grouped under the component that they affect. There is a description of the
+issue and a table with the CVE, associated references,
+<a href="#type">type of vulnerability</a>,
+<a href="/security/overview/updates-resources.html#severity">severity</a>,
+and updated AOSP versions (where applicable). When available, we link the public
+change that addressed the issue to the bug ID, like the AOSP change list. When
+multiple changes relate to a single bug, additional references are linked to
+numbers following the bug ID.</p>
+
+<h3 id="framework">Framework</h3>
+<p>The most severe vulnerability in this section could enable a local malicious
+application to bypass user interaction requirements in order to gain access to
+additional permissions.</p>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-0806</td>
+ <td>A-62998805</td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+</table>
+
+<h3 id="media-framework">Media framework</h3>
+<p>The most severe vulnerability in this section could enable a remote attacker
+using a specially crafted file to execute arbitrary code within the context of
+a privileged process.</p>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-0809</td>
+ <td>A-62673128</td>
+ <td>RCE</td>
+ <td>Critical</td>
+ <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-0810</td>
+ <td>A-38207066</td>
+ <td>RCE</td>
+ <td>Critical</td>
+ <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-0811</td>
+ <td>A-37930177</td>
+ <td>RCE</td>
+ <td>Critical</td>
+ <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-0812</td>
+ <td>A-62873231</td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-0815</td>
+ <td>A-63526567</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-0816</td>
+ <td>A-63662938</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+</table>
+
+<h3 id="system">System</h3>
+<p>The most severe vulnerability in this section could enable a proximate
+attacker to execute arbitrary code within the context of a privileged
+process.</p>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-14496</td>
+ <td>A-64575136</td>
+ <td>RCE</td>
+ <td>High</td>
+ <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+</table>
+
+<h2 id="2017-10-05-details">2017-10-05 security patch level—Vulnerability details</h2>
+<p>In the sections below, we provide details for each of the security
+vulnerabilities that apply to the 2017-10-05 patch level. Vulnerabilities are
+grouped under the component that they affect and include details such as the
+CVE, associated references, <a href="#type">type of vulnerability</a>,
+<a href="/security/overview/updates-resources.html#severity">severity</a>,
+component (where applicable), and updated AOSP versions (where applicable). When
+available, we link the public change that addressed the issue to the bug ID,
+like the AOSP change list. When multiple changes relate to a single bug,
+additional references are linked to numbers following the bug ID.</p>
+
+<h3 id="kernel-components">Kernel components</h3>
+<p>The most severe vulnerability in this section could enable a local malicious
+application to execute arbitrary code within the context of a privileged
+process.</p>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-7374</td>
+ <td>A-37866910<br />
+ <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b53cf9815bb4744958d41f3795d5d5a1d365e2d">
+Upstream kernel</a></td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>Filesystem</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-9075</td>
+ <td>A-62298712<br />
+ <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdcee2cbb8438702ea1b328fb6e0ac5e9a40c7f8">
+Upstream kernel</a></td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>Network subsystem</td>
+ </tr>
+</table>
+
+<h3 id="mediatek-components">MediaTek components</h3>
+<p>The most severe vulnerability in this section could enable a local malicious
+application to execute arbitrary code within the context of a privileged
+process.</p>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-0827</td>
+ <td>A-62539960<a href="#asterisk">*</a><br />
+ M-ALPS03353876<br />
+ M-ALPS03353861<br />
+ M-ALPS03353869<br />
+ M-ALPS03353867<br />
+ M-ALPS03353872</td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>SoC driver</td>
+ </tr>
+</table>
+
+<h3 id="qualcomm-components">Qualcomm components</h3>
+<p>The most severe vulnerability in this section could enable a remote attacker
+using a specially crafted file to execute arbitrary code within the context of
+a privileged process.</p>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-11053</td>
+ <td>A-36895857<a href="#asterisk">*</a><br />
+ QC-CR#2061544</td>
+ <td>RCE</td>
+ <td>Critical</td>
+ <td>SoC driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-9714</td>
+ <td>A-63868020<br />
+ <a href="https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=aae237dfbaf8edcf310eeb84b887b20e7e9c0ff3">
+QC-CR#2046578</a></td>
+ <td>EoP</td>
+ <td>Critical</td>
+ <td>Network subsystem</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-9683</td>
+ <td>A-62379105<br />
+ <a href="https://source.codeaurora.org/quic/la//kernel/lk/commit/?id=fe4eae96375c27eaee04bbaf112bdc5c1de62977">
+QC-CR#2036397</a></td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>Linux boot</td>
+ </tr>
+</table>
+
+
+<h2 id="questions">Common questions and answers</h2>
+<p>This section answers common questions that may occur after reading this
+bulletin.</p>
+
+<p><strong>1. How do I determine if my device is updated to address these issues?
+</strong></p>
+
+<p>To learn how to check a device's security patch level, see
+<a
+href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Check
+&amp; update your Android version</a>.</p>
+<ul>
+ <li>Security patch levels of 2017-10-01 or later address all issues associated
+ with the 2017-09-01 security patch level.</li>
+ <li>Security patch levels of 2017-10-05 or later address all issues associated
+ with the 2017-09-05 security patch level and all previous patch levels.
+ </li>
+</ul>
+<p>Device manufacturers that include these updates should set the patch string
+level to:</p>
+<ul>
+ <li>[ro.build.version.security_patch]:[2017-10-01]</li>
+ <li>[ro.build.version.security_patch]:[2017-10-05]</li>
+</ul>
+<p><strong>2. Why does this bulletin have two security patch levels?</strong></p>
+
+<p>This bulletin has two security patch levels so that Android partners have the
+flexibility to fix a subset of vulnerabilities that are similar across all
+Android devices more quickly. Android partners are encouraged to fix all issues
+in this bulletin and use the latest security patch level.</p>
+<ul>
+ <li>Devices that use the 2017-10-01 security patch level must include all issues
+ associated with that security patch level, as well as fixes for all issues
+ reported in previous security bulletins.</li>
+ <li>Devices that use the security patch level of 2017-10-05 or newer must
+ include all applicable patches in this (and previous) security
+ bulletins.</li>
+</ul>
+<p>Partners are encouraged to bundle the fixes for all issues they are addressing
+in a single update.</p>
+
+<p id="type">
+<strong>3. What do the entries in the <em>Type</em> column mean?</strong></p>
+
+<p>Entries in the <em>Type</em> column of the vulnerability details table reference
+the classification of the security vulnerability.</p>
+
+<table>
+ <col width="25%">
+ <col width="75%">
+ <tr>
+ <th>Abbreviation</th>
+ <th>Definition</th>
+ </tr>
+ <tr>
+ <td>RCE</td>
+ <td>Remote code execution</td>
+ </tr>
+ <tr>
+ <td>EoP</td>
+ <td>Elevation of privilege</td>
+ </tr>
+ <tr>
+ <td>ID</td>
+ <td>Information disclosure</td>
+ </tr>
+ <tr>
+ <td>DoS</td>
+ <td>Denial of service</td>
+ </tr>
+ <tr>
+ <td>N/A</td>
+ <td>Classification not available</td>
+ </tr>
+</table>
+<p><strong>4. What do the entries in the <em>References</em> column mean?</strong></p>
+
+<p>Entries under the <em>References</em> column of the vulnerability details table
+may contain a prefix identifying the organization to which the reference value
+belongs.</p>
+
+<table>
+ <col width="25%">
+ <col width="75%">
+ <tr>
+ <th>Prefix</th>
+ <th>Reference</th>
+ </tr>
+ <tr>
+ <td>A-</td>
+ <td>Android bug ID</td>
+ </tr>
+ <tr>
+ <td>QC-</td>
+ <td>Qualcomm reference number</td>
+ </tr>
+ <tr>
+ <td>M-</td>
+ <td>MediaTek reference number</td>
+ </tr>
+ <tr>
+ <td>N-</td>
+ <td>NVIDIA reference number</td>
+ </tr>
+ <tr>
+ <td>B-</td>
+ <td>Broadcom reference number</td>
+ </tr>
+</table>
+<p id="asterisk"><strong>5. What does a * next to the Android bug ID in the <em>References</em>
+column mean?</strong></p>
+
+<p>Issues that are not publicly available have a * next to the Android bug ID in
+the <em>References</em> column. The update for that issue is generally contained
+in the latest binary drivers for Nexus devices available from the <a
+href="https://developers.google.com/android/nexus/drivers">Google Developer
+site</a>.</p>
+
+<p id="split">
+<strong>6. Why are security vulnerabilities split between this bulletin and
+device&hairsp;/&hairsp;partner security bulletins, such as the
+Pixel&hairsp;/&hairsp;Nexus bulletin?</strong>
+</p>
+<p>
+Security vulnerabilities that are documented in this security bulletin are
+required in order to declare the latest security patch level on Android devices.
+Additional security vulnerabilities that are documented in
+device&hairsp;/&hairsp;partner security bulletins are not
+required for declaring a security patch level. Android device and chipset
+manufacturers are encouraged to document the presence of other fixes on their
+devices through their own security websites, such as the
+<a href="https://security.samsungmobile.com/securityUpdate.smsb">Samsung</a>,
+<a href="https://lgsecurity.lge.com/security_updates.html">LGE</a>, or
+<a href="/security/bulletin/pixel">Pixel&hairsp;/&hairsp;Nexus</a>
+security bulletins.
+</p>
+
+<p><strong>7. Where are the acknowledgements for this bulletin?</strong></p>
+<p>The acknowledgements for this bulletin are directly in the
+<a href="/security/overview/acknowledgements.html">Android Security
+Acknowledgements</a> page.</p>
+
+<h2 id="versions">Versions</h2>
+<table>
+ <col width="25%">
+ <col width="25%">
+ <col width="50%">
+ <tr>
+ <th>Version</th>
+ <th>Date</th>
+ <th>Notes</th>
+ </tr>
+ <tr>
+ <td>1.0</td>
+ <td>October 2, 2017</td>
+ <td>Bulletin published.</td>
+ </tr>
+</table>
+</body>
+</html>
diff --git a/en/security/bulletin/index.html b/en/security/bulletin/index.html
index b577159b..0703da46 100644
--- a/en/security/bulletin/index.html
+++ b/en/security/bulletin/index.html
@@ -22,16 +22,13 @@
-->
-<p class="note"><strong>Checking if your device is up-to-date?</strong>
-Look at <em>Google device updates</em> in the most recent bulletin.</p>
-<p>Security has always been a major focus for Android and Google Play: Android was
-built from day one with security in mind. Monthly device updates are an
-important tool to make and keep Android users safe. This page contains the
-available Android Security Bulletins. These security bulletins also include
-information users can follow to ensure their device has the latest security
-updates. Android device and chipset manufacturers may also publish security
+<p>Monthly device updates are an important tool to keep Android users safe
+and protect their devices. This page contains the available Android Security
+Bulletins, which provide fixes for possible issues affecting devices running
+Android. Android device and chipset manufacturers may also publish security
vulnerability details specific to their products, such as:</p>
<ul>
+ <li><a href="/security/bulletin/pixel/">Google</a></li>
<li><a href="https://lgsecurity.lge.com/security_updates.html">LG</a></li>
<li><a href="https://motorola-global-portal.custhelp.com/app/software-upgrade-security/g_id/5593">Motorola</a></li>
<li><a href="https://security.samsungmobile.com/securityUpdate.smsb">Samsung</a></li>
@@ -41,24 +38,18 @@ vulnerability details specific to their products, such as:</p>
<p>To get notifications when a new Android bulletin is published, join the
<a href="https://groups.google.com/forum/#!forum/android-security-updates">Android
Security Updates group</a>, and set your email delivery preference to receive
-all updates. To learn how to check if a device is up to date using the security
-patch level, read the instructions on the
-<a href="https://support.google.com/nexus/answer/4457705">Pixel and Nexus
-update schedule</a>. In general, it takes about one and a half calendar
-weeks for the OTA to reach every Nexus device. The Nexus firmware images are
-also released each month to the
-<a href="https://developers.google.com/android/nexus/images">Google Developer
-site</a>.
+all updates.
</p>
+
<h3 id="sources">Sources</h3>
<p>Fixes listed in the public bulletin come from various different sources: the
Android Open Source Project (AOSP), the upstream Linux kernel, and system-on-chip
(SOC) manufacturers. For device manufacturers:</p>
<ul>
- <li>Android platform fixes are merged into AOSP 24-48 hours after the security
- bulletin is released and can be picked up directly from there.</li>
- <li>Upstream linux kernel fixes are linked to directly from the bulletin on
+ <li>Android platform fixes are merged into AOSP 24&ndash;48 hours after the
+ security bulletin is released and can be picked up directly from there.</li>
+ <li>Upstream Linux kernel fixes are linked to directly from the bulletin on
release and can be picked up from there.</li>
<li>Fixes from SOC manufacturers are available directly from the manufacturers.</li>
</ul>
@@ -76,6 +67,22 @@ Android Open Source Project (AOSP), the upstream Linux kernel, and system-on-chi
<th>Security patch level</th>
</tr>
<tr>
+ <td><a href="/security/bulletin/2017-10-01.html">October 2017</a></td>
+ <td>Coming soon
+ <!--
+ <a href="/security/bulletin/2017-10-01.html">English</a>&nbsp;/
+ <a href="/security/bulletin/2017-10-01.html?hl=ja">日本語</a>&nbsp;/
+ <a href="/security/bulletin/2017-10-01.html?hl=ko">한국어</a>&nbsp;/
+ <a href="/security/bulletin/2017-10-01.html?hl=ru">ру́сский</a>&nbsp;/
+ <a href="/security/bulletin/2017-10-01.html?hl=zh-cn">中文&nbsp;(中国)</a>&nbsp;/
+ <a href="/security/bulletin/2017-10-01.html?hl=zh-tw">中文&nbsp;(台灣)</a>
+ -->
+ </td>
+ <td>October 2, 2017</td>
+ <td>2017-10-01<br>
+ 2017-10-05</td>
+ </tr>
+ <tr>
<td><a href="/security/bulletin/2017-09-01.html">September 2017</a></td>
<td>Coming soon
<!--
diff --git a/en/security/bulletin/pixel/2017-10-01.html b/en/security/bulletin/pixel/2017-10-01.html
new file mode 100644
index 00000000..fd8eb49d
--- /dev/null
+++ b/en/security/bulletin/pixel/2017-10-01.html
@@ -0,0 +1,675 @@
+<html devsite>
+ <head>
+ <title>Pixel/Nexus Security Bulletin—October 2017</title>
+ <meta name="project_path" value="/_project.yaml" />
+ <meta name="book_path" value="/_book.yaml" />
+ </head>
+ <body>
+ <!--
+ Copyright 2017 The Android Open Source Project
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ //www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+ -->
+ <p><em>Published October 2, 2017</em></p>
+
+<p>The Pixel/ Nexus Security Bulletin contains details of security vulnerabilities
+and functional improvements affecting
+<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">
+supported Google Pixel and Nexus devices</a> (Google devices). For
+Google devices, security patch levels of October 05, 2017 or later
+address all issues in this bulletin and all issues in the
+<a href="/security/bulletin/2017-10-01">October 2017 Android Security Bulletin</a>.
+To learn how to check a device's security patch level, see
+<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">
+Check &amp; update your Android version</a>.</p>
+
+
+<p>All supported Google devices will receive an update to the 2017-10-05 patch
+level. We encourage all customers to accept these updates to their devices.</p>
+
+<p class="note"><strong>Note:</strong> The Google device firmware images are
+available on the <a href="https://developers.google.com/android/nexus/images">
+Google Developer site</a>.</p>
+
+<h2 id="announcements">Announcements</h2>
+<ul>
+ <li>In addition to the security vulnerabilities described in the
+ <a href="/security/bulletin/2017-10-01">October 2017 Android Security
+ Bulletin</a>, Pixel and Nexus devices also contain patches for the
+ security vulnerabilities described below. Partners were notified of
+ these issues at least a month ago and may choose to
+ incorporate them as part of their device updates.
+ </li>
+ <li>Security bulletin acknowledgements are listed directly in the
+ <a href="/security/overview/acknowledgements.html">Android Security
+ Acknowledgements</a> page.</li>
+</ul>
+
+<h2 id="patches">Security patches</h2>
+Vulnerabilities are
+grouped under the component that they affect. There is a description of the
+issue and a table with the CVE, associated references,
+<a href="#type">type of vulnerability</a>,
+<a href="/security/overview/updates-resources.html#severity">severity</a>,
+and updated Android Open Source Project (AOSP) versions (where applicable).
+When available, we link the public
+change that addressed the issue to the bug ID, like the AOSP change list. When
+multiple changes relate to a single bug, additional references are linked to
+numbers following the bug ID.</p>
+
+<h3 id="framework">Framework</h3>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-0807</td>
+ <td>A-35056974</td>
+ <td>EoP</td>
+ <td>High</td>
+ <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-0808</td>
+ <td>A-62301183</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+</table>
+
+<h3 id="media-framework">Media framework</h3>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-0813</td>
+ <td>A-36531046</td>
+ <td>DoS</td>
+ <td>Moderate</td>
+ <td>7.0, 7.1.1, 7.1.2</td>
+ </tr>
+ <tr>
+ <td rowspan="2">CVE-2017-0814</td>
+ <td rowspan="2">A-62800140</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+ <tr>
+ <td>DoS</td>
+ <td>High</td>
+ <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-0817</td>
+ <td>A-63522430</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+ <tr>
+ <td rowspan="2">CVE-2017-0818</td>
+ <td rowspan="2">A-63581671</td>
+ <td>NSI</td>
+ <td>NSI</td>
+ <td>7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+ <tr>
+ <td>DoS</td>
+ <td>High</td>
+ <td>6.0, 6.0.1</td>
+ </tr>
+ <tr>
+ <td rowspan="2">CVE-2017-0819</td>
+ <td rowspan="2">A-63045918</td>
+ <td>NSI</td>
+ <td>NSI</td>
+ <td>7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+ <tr>
+ <td>DoS</td>
+ <td>High</td>
+ <td>6.0, 6.0.1</td>
+ </tr>
+ <tr>
+ <td rowspan="2">CVE-2017-0820</td>
+ <td rowspan="2">A-62187433</td>
+ <td>NSI</td>
+ <td>NSI</td>
+ <td>7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+ <tr>
+ <td>DoS</td>
+ <td>High</td>
+ <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1</td>
+ </tr>
+</table>
+
+<h3 id="system">System</h3>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Updated AOSP versions</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-0822</td>
+ <td>A-63787722</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-0823</td>
+ <td>A-37896655</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
+ </tr>
+</table>
+
+<h3 id="broadcom-components">Broadcom components</h3>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-0824</td>
+ <td>A-37622847<a href="#asterisk">*</a><br />
+ B-V2017063001</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>WiFi driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-0825</td>
+ <td>A-37305633<a href="#asterisk">*</a><br />
+ B-V2017063002</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WiFi driver</td>
+ </tr>
+</table>
+
+<h3 id="htc-components">HTC components</h3>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-0826</td>
+ <td>A-34949781<a href="#asterisk">*</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Bootloader</td>
+ </tr>
+</table>
+
+<h3 id="huawei-components">Huawei components</h3>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-0828</td>
+ <td>A-34622855<a href="#asterisk">*</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Bootloader</td>
+ </tr>
+</table>
+
+<h3 id="kernel-components">Kernel components</h3>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-7187</td>
+ <td>A-63666227<br />
+ <a
+href="https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.11/scsi-fixes&id=bf33f87dd04c371ea33feb821b60d63d754e3124">
+Upstream kernel</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>SCSI driver</td>
+ </tr>
+</table>
+
+<h3 id="motorola-components">Motorola components</h3>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-0829</td>
+ <td>A-62345044<a href="#asterisk">*</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Bootloader</td>
+ </tr>
+</table>
+
+<h3 id="qualcomm-components">Qualcomm components</h3>
+
+<table>
+ <col width="17%">
+ <col width="19%">
+ <col width="9%">
+ <col width="14%">
+ <col width="39%">
+ <tr>
+ <th>CVE</th>
+ <th>References</th>
+ <th>Type</th>
+ <th>Severity</th>
+ <th>Component</th>
+ </tr>
+ <tr>
+ <td>CVE-2017-9686</td>
+ <td>A-62827928<br />
+ <a
+href="https://www.codeaurora.org/gitweb/quic/la/?p=kernel/msm-3.18.git;a=commit;h=de875dd095d3ec0906c77518d28f793e6c69a9da">
+QC-CR#1115359</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>SPS driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11050</td>
+ <td>A-62085265<br />
+ <a
+href="https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=725674586f5bc009ef5175d29eb0fd677e0ef1f2">
+QC-CR#2064785</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11067</td>
+ <td>A-62058746<a href="#asterisk">*</a><br />
+ QC-CR#2062012</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11057</td>
+ <td>A-37949660<a href="#asterisk">*</a><br />
+ QC-CR#2059812</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Camera</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11056</td>
+ <td>A-37893116<a href="#asterisk">*</a><br />
+ QC-CR#2060504</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Crypto driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11046</td>
+ <td>A-37623773<a href="#asterisk">*</a><br />
+ QC-CR#2059656</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Audio driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11059</td>
+ <td>A-37284397<a href="#asterisk">*</a><br />
+ QC-CR#2057375</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Crypto Driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-9706</td>
+ <td>A-34170483<a href="#asterisk">*</a><br />
+ QC-CR#2030399</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Video driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11048</td>
+ <td>A-37093119<a href="#asterisk">*</a><br />
+ QC-CR#2052691</td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>Video driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-9697</td>
+ <td>A-63868628<br />
+ <a
+href="https://www.codeaurora.org/gitweb/quic/la/?p=kernel/msm-4.4.git;a=commit;h=7e45e3a6c1f6dd46d71fb6824a7cf702d2e79225">
+QC-CR#2032672</a></td>
+ <td>EoP</td>
+ <td>Moderate</td>
+ <td>SoC driver</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11051</td>
+ <td>A-62456806<br />
+ <a
+href="https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=c8f263f0e3b0b6cba38fae9b2330d77f802c51d8">
+QC-CR#2061755</a></td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-9715</td>
+ <td>A-36730104<a href="#asterisk">*</a><br />
+ QC-CR#2054958<br />
+ QC-CR#2057034</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11061</td>
+ <td>A-36816726<a href="#asterisk">*</a><br />
+ QC-CR#2054693<br />
+ QC-CR#2059701</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11060</td>
+ <td>A-36817548<a href="#asterisk">*</a><br />
+ QC-CR#2058447<br />
+ QC-CR#2054770</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-9717</td>
+ <td>A-36817053<a href="#asterisk">*</a><br />
+ QC-CR#2051450</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11052</td>
+ <td>A-37687303<a href="#asterisk">*</a><br />
+ QC-CR#2061688</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11054</td>
+ <td>A-37713609<a href="#asterisk">*</a><br />
+ QC-CR#2061251</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11062</td>
+ <td>A-37720349<a href="#asterisk">*</a><br />
+ QC-CR#2058448</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11055</td>
+ <td>A-37721426<a href="#asterisk">*</a><br />
+ QC-CR#2061241</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11064</td>
+ <td>A-36815952<a href="#asterisk">*</a><br />
+ QC-CR#2054770<br />
+ QC-CR#2058447
+QC-CR#2066628<br />
+ QC-CR#2087785</td>
+ <td>ID</td>
+ <td>Moderate</td>
+ <td>WLAN</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-9687</td>
+ <td>A-62827190<br />
+ <a href="https://www.codeaurora.org/gitweb/quic/la/?p=kernel/msm-4.4.git;a=commit;h=8f1a77f5da53edd2b5a1c42ddd766712a90109d6">
+QC-CR#2016076</a></td>
+ <td>EoP</td>
+ <td>Low</td>
+ <td>Modem</td>
+ </tr>
+ <tr>
+ <td>CVE-2017-11063</td>
+ <td>A-36716469<a href="#asterisk">*</a><br />
+ QC-CR#2053027</td>
+ <td>DoS</td>
+ <td>Low</td>
+ <td>Camera driver</td>
+ </tr>
+</table>
+
+
+<h2 id="functional-patches">Functional patches</h2>
+<p>There are no functional patches included this month.</p>
+
+
+<h2 id="questions">Common questions and answers</h2>
+<p>This section answers common questions that may occur after reading this
+bulletin.</p>
+
+<p><strong>1. How do I determine if my device is updated to address these issues?
+</strong></p>
+
+<p>Security patch levels of 2017-10-05 or later address all issues associated
+with the 2017-10-05 security patch level and all previous patch levels.To learn
+how to check a device's security patch level, read the instructions on the
+<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
+and Nexus update schedule</a>.</p>
+
+<p id="type">
+<strong>2. What do the entries in the <em>Type</em> column mean?</strong></p>
+
+<p>Entries in the <em>Type</em> column of the vulnerability details table reference
+the classification of the security vulnerability.</p>
+
+<table>
+ <col width="25%">
+ <col width="75%">
+ <tr>
+ <th>Abbreviation</th>
+ <th>Definition</th>
+ </tr>
+ <tr>
+ <td>RCE</td>
+ <td>Remote code execution</td>
+ </tr>
+ <tr>
+ <td>EoP</td>
+ <td>Elevation of privilege</td>
+ </tr>
+ <tr>
+ <td>ID</td>
+ <td>Information disclosure</td>
+ </tr>
+ <tr>
+ <td>DoS</td>
+ <td>Denial of service</td>
+ </tr>
+ <tr>
+ <td>N/A</td>
+ <td>Classification not available</td>
+ </tr>
+</table>
+<p><strong>3. What do the entries in the <em>References</em> column mean?</strong></p>
+
+<p>Entries under the <em>References</em> column of the vulnerability details table
+may contain a prefix identifying the organization to which the reference value
+belongs.</p>
+
+<table>
+ <col width="25%">
+ <col width="75%">
+ <tr>
+ <th>Prefix</th>
+ <th>Reference</th>
+ </tr>
+ <tr>
+ <td>A-</td>
+ <td>Android bug ID</td>
+ </tr>
+ <tr>
+ <td>QC-</td>
+ <td>Qualcomm reference number</td>
+ </tr>
+ <tr>
+ <td>M-</td>
+ <td>MediaTek reference number</td>
+ </tr>
+ <tr>
+ <td>N-</td>
+ <td>NVIDIA reference number</td>
+ </tr>
+ <tr>
+ <td>B-</td>
+ <td>Broadcom reference number</td>
+ </tr>
+</table>
+
+<p id="asterisk"><strong>4. What does a * next to the Android bug ID in the <em>References</em>
+column mean?</strong></p>
+
+<p>Issues that are not publicly available have a * next to the Android bug ID in
+the <em>References</em> column. The update for that issue is generally contained
+in the latest binary drivers for Nexus devices available from the <a
+href="https://developers.google.com/android/nexus/drivers">Google Developer
+site</a>.</p>
+
+<p id="split">
+<strong>5. Why are security vulnerabilities split between this bulletin and
+the Android Security Bulletins?</strong>
+</p>
+<p>
+Security vulnerabilities that are documented in the Android Security Bulletins are
+required in order to declare the latest security patch level on Android devices.
+Additional security vulnerabilities, such as those documented in this bulletin,
+are not required for declaring a security patch level.
+</p>
+
+<h2 id="versions">Versions</h2>
+<table>
+ <col width="25%">
+ <col width="25%">
+ <col width="50%">
+ <tr>
+ <th>Version</th>
+ <th>Date</th>
+ <th>Notes</th>
+ </tr>
+ <tr>
+ <td>1.0</td>
+ <td>October 2, 2017</td>
+ <td>Bulletin published.</td>
+ </tr>
+</table>
+</body>
+</html>
diff --git a/en/security/bulletin/pixel/index.html b/en/security/bulletin/pixel/index.html
new file mode 100644
index 00000000..ea492ea9
--- /dev/null
+++ b/en/security/bulletin/pixel/index.html
@@ -0,0 +1,78 @@
+<html devsite>
+ <head>
+ <title>Pixel&hairsp;/&hairsp;Nexus Security Bulletins</title>
+ <meta name="project_path" value="/_project.yaml" />
+ <meta name="book_path" value="/_book.yaml" />
+ </head>
+ <body>
+ <!--
+ Copyright 2017 The Android Open Source Project
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+ -->
+
+
+<p>This page contains the available Pixel&hairsp;/&hairsp;Nexus monthly
+bulletins. These bulletins supplement the
+<a href="/security/bulletin">Android Security Bulletins</a> with
+additional security patches and functional improvements on Pixel and Nexus
+devices. These bulletins apply to
+<a href="https://support.google.com/nexus/answer/4457705">supported Pixel and
+Nexus devices</a>.</p>
+
+<h3 id="notification">Notifications</h3>
+<p>Pixel and Nexus devices start receiving OTA updates on the same day the
+monthly bulletin is released. In general, it takes about one and a half calendar
+weeks for the OTA to reach every Nexus device. The Nexus firmware images are
+also released each month to the
+<a href="https://developers.google.com/android/nexus/images">Google Developer
+site</a>.
+</p>
+<h3 id="sources">Sources</h3>
+
+<p>Patches listed in the Pixel&hairsp;/&hairsp;Nexus bulletin come from various
+sources: the Android Open Source Project (AOSP), the upstream Linux kernel,
+and system-on-chip (SOC) manufacturers. Android platform fixes are merged into
+AOSP 24&ndash;48 hours after the Pixel&hairsp;/&hairsp;Nexus bulletin is released.</p>
+
+<h3 id="bulletins">Bulletins</h3>
+
+<table>
+ <col width="15%">
+ <col width="49%">
+ <col width="17%">
+ <col width="19%">
+ <tr>
+ <th>Bulletin</th>
+ <th>Languages</th>
+ <th>Published date</th>
+ <th>Security patch level</th>
+ </tr>
+ <tr>
+ <td><a href="/security/bulletin/pixel/2017-10-01.html">October 2017</a></td>
+ <td>Coming soon
+ <!--
+ <a href="/security/bulletin/pixel/2017-10-01.html">English</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2017-10-01.html?hl=ja">日本語</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2017-10-01.html?hl=ko">한국어</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2017-10-01.html?hl=ru">ру́сский</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2017-10-01.html?hl=zh-cn">中文&nbsp;(中国)</a>&nbsp;/
+ <a href="/security/bulletin/pixel/2017-10-01.html?hl=zh-tw">中文&nbsp;(台灣)</a>
+ -->
+ </td>
+ <td>October 2, 2017</td>
+ <td>2017-10-05</td>
+ </tr>
+</table>
+ </body>
+</html>
diff --git a/en/security/overview/acknowledgements.html b/en/security/overview/acknowledgements.html
index f287c449..d444a357 100644
--- a/en/security/overview/acknowledgements.html
+++ b/en/security/overview/acknowledgements.html
@@ -35,336 +35,794 @@ Rewards</a> program.</p>
<h2 id="2017">2017</h2>
-<div style="LINE-HEIGHT:25px;">
-
-<p>ADlab of Venustech</p>
-
-<p>Alexander Potapenko of Google Dynamic Tools team</p>
-
-<p>Alexandru Blanda</p>
-
-<p>Amir Cohen of Ben Gurion University Cyber Lab</p>
-
-<p>Ao Wang (<a href="//twitter.com/ArayzSegment">@ArayzSegment</a>)
- of <a href="//www.pwnzen.com/">Pangu Team</a></p>
-
-<p>Dr. Asaf Shabtai of Ben Gurion University Cyber Lab</p>
-
-<p>Baozeng Ding (<a href="https://twitter.com/sploving1">@sploving</a>)
-of Alibaba Mobile Security Group</p>
-
-<p>Ben Actis (<a href="https://twitter.com/ben_ra">@Ben_RA</a>)</p>
-
-<p>Ben Seri of <a href="https://armis.com">Armis, Inc.</a></p>
-
-<p>Billy Lau of Android Security</p>
-
-<p>Bo Liu of <a href="http://www.ms509.com">MS509Team</a></p>
-
-<p>Chenfu Bao (包沉浮) of Baidu X-Lab (百度安全实验室)</p>
-
-<p>Chengming Yang of Alibaba Mobile Security Group</p>
-
-<p><a href="mailto:zc1991@mail.ustc.edu.cn">Chi Zhang</a>of
- <a href="//c0reteam.org">C0RE Team</a></p>
-
-<p>Chiachih Wu (<a href="https://twitter.com/chiachih_wu">@chiachih_wu</a>)
-of <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p><a href="http://weibo.com/csddl">Chong Wang</a> of
-Chengdu Security Response Center, Qihoo 360 Technology Co. Ltd.</p>
-
-<p>Cong Zheng (<a href="https://twitter.com/shellcong">@shellcong</a>)
-of Palo Alto Networks</p>
-
-<p><a href="mailto:shaodacheng2016@gmail.com">Dacheng Shao</a>
-of <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>Daniel Dakhno</p>
-
-<p>Daniel Micay of Copperhead Security</p>
-
-<p>Daxing Guo (<a href="https://twitter.com/freener0">@freener0</a>) of Xuanwu
- Lab, Tencent</p>
-
-<p><a href="mailto:derrek.haxx@gmail.com">derrek</a>
- (<a href="https://twitter.com/derrekr6">@derrekr6</a>)</p>
-
-<p>Di Shen (<a href="https://twitter.com/returnsme">@returnsme</a>) of KeenLab
- (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p>
-
-<p>donfos (Aravind Machiry) of Shellphish Grill Team, UC Santa Barbara</p>
-
-<p><a href="http://www.linkedin.com/in/dzima">Dzmitry Lukyanenka</a></p>
-
-<p>Ecular Xu (徐健) of Trend Micro</p>
-
-<p>Elphet of Alpha Team, Qihoo 360 Technology Co. Ltd.</p>
-
-<p>En He (<a href="http://twitter.com/heeeeen4x">@heeeeen4x</a>) of
-<a href="http://www.ms509.com">MS509Team</a></p>
-
-<p>Fang Chen of Sony Mobile Communications Inc.</p>
-
-<p>Frank Liberato of Chrome</p>
-
-<p>Gal Beniamini of Project Zero</p>
-
-<p>Gengjia Chen (<a href="https://twitter.com/chengjia4574">@chengjia4574</a>)
- of IceSword Lab, Qihoo 360 Technology Co. Ltd.</p>
-
-<p>godzheng (郑文选 <a href="https://twitter.com/virtualseekers">@VirtualSeekers</a>)
-of Tencent PC Manager</p>
-
-<p>Google WebM Team</p>
-
-<p>Gregory Vishnepolsky of <a href="https://armis.com">Armis, Inc.</a></p>
-
-<p>Guang Gong (龚广) (<a href="http://twitter.com/oldfresher">@oldfresher</a>) of
- Alpha Team, <a href="http://www.360.com">Qihoo 360 Technology Co. Ltd.</a></p>
-
-<p>Guangdong Bai of Singapore Institute of Technology (SIT)</p>
-
-<p><a href="https://www.linkedin.com/in/g%C3%BCliz-seray-tuncay-952a1b9/">Güliz
-Seray Tuncay</a> of the <a
-href="http://tuncay2.web.engr.illinois.edu">University of Illinois at
-Urbana-Champaign</a></p>
-
-<p><a href="mailto:arnow117@gmail.com">Hanxiang Wen</a> of <a
- href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>Hao Chen of Alpha Team, Qihoo 360 Technology Co. Ltd.</p>
-
-<p>Hiroki Yamamoto of Sony Mobile Communications Inc.</p>
-
-<p><a href="mailto:hlhan@bupt.edu.cn">Hongli Han</a> of
- <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>hujianfei of Qihoo360 Qex Team</p>
-
-<p>Ian Foster (<a href="https://twitter.com/lanrat">@lanrat</a>)</p>
-
-<p>Jack Tang of Trend Micro Inc.</p>
-
-<p>Jake Corina of Shellphish Grill Team</p>
-
-<p>Jason Gu of Trend Micro</p>
-
-<p>Jeff Sharkey of Google</p>
-
-<p>Jeff Trim</p>
-
-<p>Jianjun Dai (<a href="https://twitter.com/Jioun_dai">@Jioun_dai</a>) of <a
-href="https://skyeye.360safe.com">Qihoo 360 Skyeye Labs</a></p>
-
-<p>Jianqiang Zhao (<a href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>)
- of IceSword Lab, Qihoo 360</p>
-
-<p>Joey Brand of Census Consulting Inc.</p>
-
-<p>Jon Sawyer (<a href="http://twitter.com/jcase">@jcase</a>)</p>
-
-<p>Juhu Nie of Xiaomi Inc.</p>
-
-<p>Jun Cheng of Alibaba Inc.</p>
-
-<p>Lenx Wei (韦韬) of Baidu X-Lab (百度安全实验室)</p>
-
-<p>Liyadong of Qex Team, Qihoo 360</p>
-
-<p><a href="mailto:zlbzlb815@163.com">Lubo Zhang</a>
-of <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>ma.la of LINE Corporation</p>
-
-<p>Makoto Onuki of Google</p>
-
-<p>Marco Bartoli (<a href="https://twitter.com/wsxarcher">@wsxarcher</a>)</p>
-
-<p><a href="mailto:salyzyn@android.com">Mark Salyzyn</a> of Google</p>
-
-<p>Max Spector of Google</p>
-
-<p>Michael Goberman of IBM Security X-Force</p>
-
-<p>Mike Anderson (<a href="https://twitter.com/manderbot">@manderbot</a>)
- of Tesla Motors Product Security Team</p>
-
-<p>Mingjian Zhou (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>)
-of <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>Monk Avel</p>
-
-<p>Nan Li of Xiaomi Inc.</p>
-
-<p>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>)
-of Tesla Motors Product Security Team</p>
-
-<p>Nick Stephens of Shellphish Grill Team</p>
-
-<p>Nikolay Elenkov of LINE Corporation</p>
-
-<p><a href="mailto:jiych.guru@gmail.com">Niky1235</a>
-(<a href="https://twitter.com/jiych_guru">@jiych_guru</a>)</p>
-
-<p>Ning You of Alibaba Mobile Security Group</p>
-
-<p>Nitay Artenstein of Exodus Intelligence</p>
-
-<p>Omer Shwartz of Ben Gurion University Cyber Lab</p>
-
-<p>Peide Zhang of Vulpecker Team, Qihoo 360 Technology Co. Ltd.</p>
-
-<p>Peng Xiao of Alibaba Mobile Security Group</p>
-
-<p>Pengfei Ding (丁鹏飞) of Baidu X-Lab (百度安全实验室)</p>
-
-<p>Peter Pi (<a href="https://twitter.com/heisecode">@heisecode</a>)
- of Trend Micro</p>
-
-<p><a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360
- Technology Co. Ltd.</p>
-
-<p>Qidan He (何淇丹) (<a href="https://twitter.com/flanker_hqd">@flanker_hqd</a>)
- of KeenLab, Tencent (腾讯科恩实验室)</p>
-
-<p>Qing Zhang of Qihoo 360</p>
-
-<p>Qiwu Huang of Xiaomi Inc.</p>
-
-<p>Quhe of Ant-financial Light-Year Security Lab (蚂蚁金服巴斯光年安全实验室)</p>
-
-<p>Roee Hay of <a href="https://alephsecurity.com/">Aleph Research</a>, HCL Technologies</p>
-
-<p>Sagi Kedmi of IBM X-Force Research</p>
-
-<p><a href="mailto:keun-o.park@darkmatter.ae">Sahara</a> of Secure
-Communications in DarkMatter</p>
-
-<p>salls (<a href="https://twitter.com/chris_salls">@chris_salls</a>) of
-Shellphish Grill Team, UC Santa Barbara</p>
-
-<p>Scott Bauer (<a href="http://twitter.com/ScottyBauer1">@ScottyBauer1</a>)</p>
-
-<p>Sean Beaupre (<a href="https://twitter.com/firewaterdevs">@firewaterdevs</a>)</p>
-
-<p>Seven Shen (<a href="https://twitter.com/lingtongshen">@lingtongshen</a>) of
- Trend Micro Mobile Threat Research Team</p>
-
-<p>Shinichi Matsumoto of Fujitsu</p>
-
-<p><a href="mailto:smarques84@gmail.com">Stéphane Marques</a> of <a
-href="http://www.byterev.com">ByteRev</a></p>
-
-<p>Stephen Morrow</p>
-
-<p>Svetoslav Ganov of Google</p>
-
-<p>Timothy Becker of CSS Inc.</p>
-
-<p><a href="mailto:segfault5514@gmail.com">Tong Lin</a>
-of <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>Uma Sankar Pradhan (<a href="https://twitter.com/umasankar_iitd">@umasankar_iitd</a>)</p>
-
-<p>Valerio Costamagna (<a href="https://twitter.com/vaio_co">@vaio_co</a>)</p>
-
-<p>Vasily Vasiliev</p>
-
-<p>V.E.O (<a href="https://twitter.com/vysea">@VYSEa</a>) of Mobile Threat
- Research Team, <a href="http://www.trendmicro.com">Trend Micro</a></p>
-
-<p>wanchouchou of Ant-financial Light-Year Security Lab (蚂蚁金服巴斯光年安全实验室)</p>
-
-<p>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of
- Alibaba Inc.</p>
-
-<p>Wenjun Hu of Palo Alto Networks</p>
-
-<p><a href="mailto:vancouverdou@gmail.com">Wenke Dou</a> of
- <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>Wenlin Yang (<a href="https://twitter.com/wenlin_yang">@wenlin_yang</a>)
-of Alpha Team, Qihoo 360 Technology Co. Ltd.</p>
-
-<p>Wish Wu (<a href="https://twitter.com/wish_wu">@wish_wu</a>)
-(<a href="http://www.weibo.com/wishlinux">吴潍浠</a> 此彼) of Ant-financial Light-Year
- Security Lab</p>
-
-<p>Xiao Zhang of Palo Alto Networks</p>
-
-<p><a href="mailto:wisedd@gmail.com">Xiaodong Wang</a>
-of <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>Xiling Gong of Tencent Security Platform Department</p>
-
-<p>Xingyuan Lin of 360 Marvel Team</p>
-
-<p>Xuxian Jiang of <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>Yan Zhou of Eagleye team, SCC, Huawei</p>
-
-<p><a href="mailto:bigwyfone@gmail.com">Yanfeng Wang</a>
-of <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>Yang Cheng of Xiaomi Inc.</p>
-
-<p><a href="mailto:huahuaisadog@gmail.com">Yang Dai</a> of Vulpecker Team, Qihoo
-360 Technology Co. Ltd</p>
-
-<p>Yang Song of Alibaba Mobile Security Group</p>
-
-<p>Yangkang (<a href="https://twitter.com/dnpushme">@dnpushme</a>) of Qex Team, Qihoo 360</p>
-
-<p><a href="mailto:yaojun8558363@gmail.com">Yao Jun</a> of
- <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>Yong Wang (王勇) (<a href="https://twitter.com/ThomasKing2014">@ThomasKing2014</a>)
- of Alibaba Inc.</p>
-
-<p>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of
- IceSword Lab, Qihoo 360 Technology Co. Ltd.</p>
-
-<p>Yongke Wang of <a href="http://xlab.tencent.com">Tencent's Xuanwu Lab</a></p>
-
-<p>Dr. Yossi Oren of Ben Gurion University Cyber Lab</p>
-
-<p><a href="http://weibo.com/panyu6325">Yu Pan</a> of Vulpecker Team, Qihoo 360 Technology Co. Ltd</p>
-
-<p><a href="mailto:computernik@gmail.com">Yuan-Tsung Lo</a> of
- <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>Yuebin Sun of <a href="http://xlab.tencent.com">Tencent's
-Xuanwu Lab</a></p>
-
-<p>Yuqi Lu (<a href="https://twitter.com/nikos233__">@nikos233</a>)
-of <a href="http://c0reteam.org">C0RE Team</a></p>
-
-<p>Yuxiang Li (<a href="https://twitter.com/xbalien29">@Xbalien29</a>) of
- Tencent Security Platform Department</p>
-
-<p>Zhanpeng Zhao (行之) (<a href="https://twitter.com/0xr0ot">@0xr0ot</a>) of
- Security Research Lab, <a href="http://www.cmcm.com/">Cheetah Mobile</a></p>
-
-<p>Zhe Jin (金哲) of
-Chengdu Security Response Center, Qihoo 360 Technology Co. Ltd.</p>
-
-<p><a href="mailto:zhouzhenster@gmail.com">Zhen Zhou</a> (
- <a href="https://twitter.com/henices">@henices</a>) of
- <a href="http://www.nsfocus.com">NSFocus</a></p>
-
-<p>Zhi Xu of Palo Alto Networks</p>
-
- <p><a href="mailto:sundaywind2004@gmail.com">Zhixin Li</a> of
- <a href="http://www.nsfocus.com">NSFocus</a></p>
-
- <p><a href="http://weibo.com/ele7enxxh">Zinuo Han</a> from Chengdu Security
- Response Center of Qihoo 360 Technology Co. Ltd.</p>
-
- <p>Zubin Mithra of Google</p>
-
- </div>
+<table>
+ <col width="50%">
+ <col width="50%">
+ <tr>
+ <th>Researcher</th>
+ <th>CVEs</th>
+ </tr>
+ <tr>
+ <td>ADlab of Venustech</td>
+ <td>CVE-2017-0630</td>
+ </tr>
+ <tr>
+ <td>Alexander Potapenko of Google Dynamic Tools team</td>
+ <td>CVE-2017-0537</td>
+ </tr>
+ <tr>
+ <td>Alexandru Blanda</td>
+ <td>CVE-2017-0390</td>
+ </tr>
+ <tr>
+ <td>Amir Cohen of Ben Gurion University Cyber Lab</td>
+ <td>CVE-2017-0650</td>
+ </tr>
+ <tr>
+ <td>Ao Wang (<a href="https://twitter.com/ArayzSegment">@ArayzSegment</a>) of
+<a href="https://www.pwnzen.com/">Pangu Team</a></td>
+ <td>CVE-2017-0691, CVE-2017-0700</td>
+ </tr>
+ <tr>
+ <td>Dr. Asaf Shabtai of Ben Gurion University Cyber Lab</td>
+ <td>CVE-2017-0650</td>
+ </tr>
+ <tr>
+ <td>Baozeng Ding (<a href="https://twitter.com/sploving">@sploving</a>) of
+Alibaba Mobile Security Group</td>
+ <td>CVE-2017-0463, CVE-2017-0506, CVE-2017-0711, CVE-2017-0741,
+CVE-2017-0742, CVE-2017-0751, CVE-2017-0796, CVE-2017-0798, CVE-2017-0800,
+CVE-2017-0827, CVE-2017-11000, CVE-2017-11059</td>
+ </tr>
+ <tr>
+ <td>Ben Actis (<a href="https://twitter.com/ben_ra">@Ben_RA</a>)</td>
+ <td>CVE-2016-8461</td>
+ </tr>
+ <tr>
+ <td>Ben Seri of <a href="https://armis.com/">Armis, Inc.</a></td>
+ <td>CVE-2017-0781, CVE-2017-0782, CVE-2017-0783, CVE-2017-0785</td>
+ </tr>
+ <tr>
+ <td>Billy Lau of Android Security</td>
+ <td>CVE-2017-0335, CVE-2017-0336, CVE-2017-0338, CVE-2017-0460,
+CVE-2017-8263, CVE-2017-9682</td>
+ </tr>
+ <tr>
+ <td>Bo Liu of <a href="http://www.ms509.com/">MS509Team</a></td>
+ <td>CVE-2017-0490, CVE-2017-0601, CVE-2017-0639, CVE-2017-0645, CVE-2017-0784</td>
+ </tr>
+ <tr>
+ <td>Chao Yang of Alibaba Mobile Security Group</td>
+ <td>CVE-2016-10280, CVE-2016-10281, CVE-2017-0565</td>
+ </tr>
+ <tr>
+ <td>Chenfu Bao (包沉浮) of Baidu X-Lab (百度安全实验室)</td>
+ <td>CVE-2016-8417, CVE-2016-10236, CVE-2017-0728, CVE-2017-0738,
+CVE-2017-0766, CVE-2017-0794, CVE-2017-9681, CVE-2017-9684, CVE-2017-9693,
+CVE-2017-9694, CVE-2017-9715, CVE-2017-9717, CVE-2017-9720, CVE-2017-11001,
+CVE-2017-10999, CVE-2017-11057,
+CVE-2017-11060, CVE-2017-11061, CVE-2017-11064</td>
+ </tr>
+ <tr>
+ <td>Chengming Yang of Alibaba Mobile Security Group</td>
+ <td>CVE-2016-10280, CVE-2016-10281, CVE-2017-0463, CVE-2017-0506,
+CVE-2017-0565, CVE-2017-0711, CVE-2017-0741, CVE-2017-0742, CVE-2017-0751,
+CVE-2017-0796, CVE-2017-0798, CVE-2017-0800, CVE-2017-0827, CVE-2017-11000,
+CVE-2017-11059</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:zc1991@mail.ustc.edu.cn">Chi Zhang</a> of <a
+href="https://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2017-0666, CVE-2017-0681, CVE-2017-0684, CVE-2017-0765</td>
+ </tr>
+ <tr>
+ <td>Chiachih Wu (<a href="https://twitter.com/chiachih_wu">@chiachih_wu</a>)
+of <a href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2016-8425, CVE-2016-8426, CVE-2016-8430, CVE-2016-8431,
+CVE-2016-8432, CVE-2016-8449, CVE-2016-8435, CVE-2016-8480, CVE-2016-8481,
+CVE-2016-8482, CVE-2017-0383, CVE-2017-0384, CVE-2017-0385, CVE-2017-0398,
+CVE-2017-0400, CVE-2017-0401, CVE-2017-0402, CVE-2017-0428, CVE-2017-0429,
+CVE-2017-0435, CVE-2017-0436, CVE-2017-0444, CVE-2017-0448</td>
+ </tr>
+ <tr>
+ <td><a href="http://weibo.com/csddl">Chong Wang</a> of Chengdu Security
+Response Center, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2017-0758</td>
+ </tr>
+ <tr>
+ <td>Cong Zheng (<a href="https://twitter.com/shellcong">@shellcong</a>) of
+Palo Alto Networks</td>
+ <td>CVE-2017-0752</td>
+ </tr>
+ <tr>
+ <td>Constantinos Patsakis of University of Piraeus</td>
+ <td>CVE-2017-0807</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:shaodacheng2016@gmail.com">Dacheng Shao</a> of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2017-0483, CVE-2017-0739, CVE-2017-0769, CVE-2017-0801</td>
+ </tr>
+ <tr>
+ <td>Daniel Dakhno</td>
+ <td>CVE-2017-0420</td>
+ </tr>
+ <tr>
+ <td>Daniel Micay of Copperhead Security</td>
+ <td>CVE-2017-0397, CVE-2017-0405, CVE-2017-0410, CVE-2017-0826</td>
+ </tr>
+ <tr>
+ <td>Daxing Guo (<a href="https://twitter.com/freener0">@freener0</a>) of
+Xuanwu Lab, Tencent</td>
+ <td>CVE-2017-0386, CVE-2017-0553, CVE-2017-0585, CVE-2017-0706</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:derrek.haxx@gmail.com">derrek</a> (<a
+href="https://twitter.com/derrekr6">@derrekr6</a>)</td>
+ <td>CVE-2016-8413, CVE-2016-8477, CVE-2017-0392, CVE-2017-0521,
+CVE-2017-0531, CVE-2017-0576, CVE-2017-8260</td>
+ </tr>
+ <tr>
+ <td>Di Shen (<a href="https://twitter.com/returnsme">@returnsme</a>) of
+KeenLab (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</td>
+ <td>CVE-2016-8412, CVE-2016-8427, CVE-2016-8444, CVE-2016-10287,
+CVE-2017-0334, CVE-2017-0403, CVE-2017-0427, CVE-2017-0456, CVE-2017-0457,
+CVE-2017-0525, CVE-2017-8265</td>
+ </tr>
+ <tr>
+ <td>donfos (Aravind Machiry) of Shellphish Grill Team, UC Santa Barbara</td>
+ <td>CVE-2016-5349, CVE-2016-8448, CVE-2016-8470, CVE-2016-8471, CVE-2016-8472</td>
+ </tr>
+ <tr>
+ <td><a href="http://www.linkedin.com/in/dzima">Dzmitry Lukyanenka</a></td>
+ <td>CVE-2017-0414, CVE-2017-0703, CVE-2017-0808</td>
+ </tr>
+ <tr>
+ <td>Ecular Xu (徐健) of Trend Micro</td>
+ <td>CVE-2017-0599, CVE-2017-0635, CVE-2017-0641, CVE-2017-0643</td>
+ </tr>
+ <tr>
+ <td>Efthimios Alepis of University of Piraeus</td>
+ <td>CVE-2017-0807</td>
+ </tr>
+ <tr>
+ <td>Elphet of Alpha Team, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2017-0692, CVE-2017-0694, CVE-2017-0771, CVE-2017-0774, CVE-2017-0775</td>
+ </tr>
+ <tr>
+ <td>En He (<a href="http://twitter.com/heeeeen4x">@heeeeen4x</a>) of <a
+href="http://www.ms509.com/">MS509Team</a></td>
+ <td>CVE-2017-0394, CVE-2017-0490, CVE-2017-0601, CVE-2017-0639,
+CVE-2017-0645, CVE-2017-0784</td>
+ </tr>
+ <tr>
+ <td>Ethan Yonker of <a href="https://twrp.me/">Team Win Recovery Project</a></td>
+ <td>CVE-2017-0493</td>
+ </tr>
+ <tr>
+ <td>Fang Chen of Sony Mobile Communications Inc.</td>
+ <td>CVE-2017-0481</td>
+ </tr>
+ <tr>
+ <td>Frank Liberato of Chrome</td>
+ <td>CVE-2017-0409</td>
+ </tr>
+ <tr>
+ <td>Gal Beniamini of Project Zero</td>
+ <td>CVE-2017-0411, CVE-2017-0412, CVE-2017-0561, CVE-2017-0569
+CVE-2017-0570, CVE-2017-0571, CVE-2017-0572</td>
+ </tr>
+ <tr>
+ <td>Gengjia Chen (<a
+href="https://twitter.com/chengjia4574">@chengjia4574</a>) of IceSword Lab,
+Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2016-8464, CVE-2016-10285, CVE-2016-10288, CVE-2016-10290,
+CVE-2016-10294, CVE-2016-10295, CVE-2016-10296, CVE-2017-0329, CVE-2017-0332,
+CVE-2017-0432, CVE-2017-0434, CVE-2017-0446, CVE-2017-0447, CVE-2017-0500,
+CVE-2017-0501, CVE-2017-0502, CVE-2017-0503, CVE-2017-0509, CVE-2017-0524,
+CVE-2017-0529, CVE-2017-0536, CVE-2017-0566, CVE-2017-0573, CVE-2017-0581,
+CVE-2017-0616, CVE-2017-0617, CVE-2017-0624, CVE-2017-0649, CVE-2017-0744,
+CVE-2017-6426, CVE-2017-8243, CVE-2017-8266, CVE-2017-8270, CVE-2017-9691,
+CVE-2017-10997</td>
+ </tr>
+ <tr>
+ <td>Godzheng (郑文选 <a
+href="https://twitter.com/virtualseekers">@VirtualSeekers</a>) of Tencent PC
+Manager</td>
+ <td>CVE-2017-0602, CVE-2017-0646</td>
+ </tr>
+ <tr>
+ <td>Google WebM Team</td>
+ <td>CVE-2017-0393</td>
+ </tr>
+ <tr>
+ <td>Gregory Vishnepolsky of <a href="https://armis.com/">Armis, Inc.</a></td>
+ <td>CVE-2017-0781, CVE-2017-0782, CVE-2017-0783, CVE-2017-0785</td>
+ </tr>
+ <tr>
+ <td>Guang Gong (龚广) (<a href="http://twitter.com/oldfresher">@oldfresher</a>)
+of Alpha Team, <a href="http://www.360.com/">Qihoo 360 Technology Co. Ltd.</a></td>
+ <td>CVE-2016-8415, CVE-2016-8419, CVE-2016-8420, CVE-2016-8421,
+CVE-2016-8454, CVE-2016-8455, CVE-2016-8456, CVE-2016-8457, CVE-2016-8465,
+CVE-2016-8476, CVE-2016-10283, CVE-2017-0387, CVE-2017-0415, CVE-2017-0437,
+CVE-2017-0438, CVE-2017-0439, CVE-2017-0441, CVE-2017-0442, CVE-2017-0443,
+CVE-2017-0453, CVE-2017-0454, CVE-2017-0461, CVE-2017-0464, CVE-2017-0547,
+CVE-2017-0567, CVE-2017-0574, CVE-2017-0575, CVE-2017-0577, CVE-2017-0580,
+CVE-2017-0584, CVE-2017-0692, CVE-2017-0694, CVE-2017-0727, CVE-2017-0748,
+CVE-2017-0771, CVE-2017-0774, CVE-2017-0775, CVE-2017-0786, CVE-2017-0787,
+CVE-2017-0788, CVE-2017-0789, CVE-2017-0790, CVE-2017-0791, CVE-2017-0792,
+CVE-2017-0825, CVE-2017-6424</td>
+ </tr>
+ <tr>
+ <td>Guangdong Bai of Singapore Institute of Technology (SIT)</td>
+ <td>CVE-2017-0496</td>
+ </tr>
+ <tr>
+ <td><a
+href="https://www.linkedin.com/in/g%C3%BCliz-seray-tuncay-952a1b9/">Güliz Seray
+Tuncay</a> of the <a href="http://tuncay2.web.engr.illinois.edu/">University of
+Illinois at Urbana-Champaign</a></td>
+ <td>CVE-2017-0593</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:arnow117@gmail.com">Hanxiang Wen</a> of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2017-0400, CVE-2017-0418, CVE-2017-0479, CVE-2017-0480,
+CVE-2017-0665, CVE-2017-0681, CVE-2017-0737</td>
+ </tr>
+ <tr>
+ <td>Hao Chen of Alpha Team, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2016-8415, CVE-2016-8419, CVE-2016-8420, CVE-2016-8421,
+CVE-2016-8454, CVE-2016-8455, CVE-2016-8456, CVE-2016-8457, CVE-2016-8465,
+CVE-2016-8476, CVE-2016-10283, CVE-2017-0437, CVE-2017-0438, CVE-2017-0439,
+CVE-2017-0441, CVE-2017-0442, CVE-2017-0443, CVE-2017-0453, CVE-2017-0454,
+CVE-2017-0461, CVE-2017-0464, CVE-2017-0567, CVE-2017-0574, CVE-2017-0575,
+CVE-2017-0577, CVE-2017-0580, CVE-2017-0584, CVE-2017-0748, CVE-2017-0786,
+CVE-2017-0787, CVE-2017-0788, CVE-2017-0789, CVE-2017-0790, CVE-2017-0791,
+CVE-2017-0792, CVE-2017-0825, CVE-2017-6424</td>
+ </tr>
+ <tr>
+ <td>Hao Qin of Security Research Lab, Cheetah Mobile</td>
+ <td>CVE-2017-11056</td>
+ </tr>
+ <tr>
+ <td>Hiroki Yamamoto of Sony Mobile Communications Inc.</td>
+ <td>CVE-2017-0481</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:hlhan@bupt.edu.cn">Hongli Han</a> of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2017-0384, CVE-2017-0385, CVE-2017-0731, CVE-2017-0739</td>
+ </tr>
+ <tr>
+ <td>hujianfei of Qihoo360 Qex Team</td>
+ <td>CVE-2017-0753</td>
+ </tr>
+ <tr>
+ <td>Ian Foster (<a href="https://twitter.com/lanrat">@lanrat</a>)</td>
+ <td>CVE-2017-0554</td>
+ </tr>
+ <tr>
+ <td>Jack Tang of Trend Micro Inc.</td>
+ <td>CVE-2017-0579, CVE-2017-9706</td>
+ </tr>
+ <tr>
+ <td>Jake Corina of Shellphish Grill Team</td>
+ <td>CVE-2017-0636, CVE-2017-0802</td>
+ </tr>
+ <tr>
+ <td>Jason Gu of Trend Micro</td>
+ <td>CVE-2017-0780</td>
+ </tr>
+ <tr>
+ <td>Jeff Sharkey of Google</td>
+ <td>CVE-2017-0421, CVE-2017-0423</td>
+ </tr>
+ <tr>
+ <td>Jeff Trim</td>
+ <td>CVE-2017-0422</td>
+ </tr>
+ <tr>
+ <td>Jianjun Dai (<a href="https://twitter.com/Jioun_dai">@Jioun_dai</a>) of
+<a href="https://skyeye.360safe.com/">Qihoo 360 Skyeye Labs</a></td>
+ <td>CVE-2017-0478, CVE-2017-0541, CVE-2017-0559</td>
+ </tr>
+ <tr>
+ <td>Jianqiang Zhao (<a
+href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>) of IceSword Lab,
+Qihoo 360</td>
+ <td>CVE-2016-5346, CVE-2016-8416, CVE-2016-8475, CVE-2016-8478,
+CVE-2017-0445, CVE-2017-0458, CVE-2017-0459, CVE-2017-0518, CVE-2017-0519,
+CVE-2017-0533, CVE-2017-0534, CVE-2017-6425, CVE-2017-8233, CVE-2017-8261,
+CVE-2017-8268</td>
+ </tr>
+ <tr>
+ <td>Joey Brand of Census Consulting Inc.</td>
+ <td>CVE-2017-0698</td>
+ </tr>
+ <tr>
+ <td>Jon Sawyer (<a href="http://twitter.com/jcase">@jcase</a>)</td>
+ <td>CVE-2016-8461, CVE-2016-8462</td>
+ </tr>
+ <tr>
+ <td>Juhu Nie of Xiaomi Inc.</td>
+ <td>CVE-2016-10276</td>
+ </tr>
+ <tr>
+ <td>Jun Cheng of Alibaba Inc.</td>
+ <td>CVE-2017-0404</td>
+ </tr>
+ <tr>
+ <td>Kevin Deus of Google</td>
+ <td>CVE-2017-11052, CVE-2017-11054, CVE-2017-11055, CVE-2017-11062</td>
+ </tr>
+ <tr>
+ <td>Lenx Wei (韦韬) of Baidu X-Lab (百度安全实验室)</td>
+ <td>CVE-2016-8417, CVE-2016-10236, CVE-2017-0728, CVE-2017-0738,
+CVE-2017-0766, CVE-2017-0794 CVE-2017-9681, CVE-2017-9684, CVE-2017-9693,
+CVE-2017-9694, CVE-2017-9720, CVE-2017-10999, CVE-2017-11001, CVE-2017-11057,
+CVE-2017-11060, CVE-2017-11061, CVE-2017-11064</td>
+ </tr>
+ <tr>
+ <td>Liyadong of Qex Team, Qihoo 360</td>
+ <td>CVE-2017-0647</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:zlbzlb815@163.com">Lubo Zhang</a> of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2016-8479, CVE-2017-0564, CVE-2017-7368</td>
+ </tr>
+ <tr>
+ <td>ma.la of LINE Corporation</td>
+ <td>CVE-2016-5552</td>
+ </tr>
+ <tr>
+ <td>Makoto Onuki of Google</td>
+ <td>CVE-2017-0491</td>
+ </tr>
+ <tr>
+ <td>Marco Bartoli (<a href="https://twitter.com/wsxarcher">@wsxarcher</a>)</td>
+ <td>CVE-2017-0712</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:salyzyn@android.com">Mark Salyzyn</a> of Google</td>
+ <td>CVE-2017-0558</td>
+ </tr>
+ <tr>
+ <td>Max Spector of Google</td>
+ <td>CVE-2017-0416</td>
+ </tr>
+ <tr>
+ <td>Michael Goberman of IBM Security X-Force</td>
+ <td>CVE-2016-8467</td>
+ </tr>
+ <tr>
+ <td><a href="https://github.com/michalbednarski">Michal Bednarski</a></td>
+ <td>CVE-2017-0598, CVE-2017-0806</td>
+ </tr>
+ <tr>
+ <td>Mike Anderson (<a href="https://twitter.com/manderbot">@manderbot</a>) of
+Tesla Motors Product Security Team</td>
+ <td>CVE-2017-0327, CVE-2017-0328</td>
+ </tr>
+ <tr>
+ <td>Mingjian Zhou (<a
+href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>) of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2017-0383, CVE-2017-0417, CVE-2017-0418, CVE-2017-0425,
+CVE-2017-0450, CVE-2017-0479, CVE-2017-0480, CVE-2017-0483, CVE-2017-0665,
+CVE-2017-0666, CVE-2017-0681, CVE-2017-0684, CVE-2017-0731, CVE-2017-0737,
+CVE-2017-0739, CVE-2017-0765, CVE-2017-0768, CVE-2017-0769, CVE-2017-0779,
+CVE-2017-0801, CVE-2017-0812, CVE-2017-0815, CVE-2017-0816</td>
+ </tr>
+ <tr>
+ <td>Monk Avel</td>
+ <td>CVE-2017-0396, CVE-2017-0399</td>
+ </tr>
+ <tr>
+ <td>Nan Li of Xiaomi Inc.</td>
+ <td>CVE-2016-10276</td>
+ </tr>
+ <tr>
+ <td>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>)</td>
+ <td>CVE-2017-0535</td>
+ </tr>
+ <tr>
+ <td>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>) of
+Tesla Motors Product Security Team</td>
+ <td>CVE-2017-0306, CVE-2017-0327, CVE-2017-0328, CVE-2017-0331,
+CVE-2017-0606, CVE-2017-8242, CVE-2017-9679</td>
+ </tr>
+ <tr>
+ <td>Nick Stephens of Shellphish Grill Team</td>
+ <td>CVE-2017-0636, CVE-2017-0802</td>
+ </tr>
+ <tr>
+ <td>Nikolay Elenkov of LINE Corporation</td>
+ <td>CVE-2016-5552</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:jiych.guru@gmail.com">Niky1235</a> (<a
+href="https://twitter.com/jiych_guru">@jiych_guru</a>)</td>
+ <td>CVE-2017-0603, CVE-2017-0670, CVE-2017-0697, CVE-2017-0726, CVE-2017-0818</td>
+ </tr>
+ <tr>
+ <td>Ning You of Alibaba Mobile Security Group</td>
+ <td>CVE-2016-10280, CVE-2016-10281, CVE-2017-0463, CVE-2017-0565</td>
+ </tr>
+ <tr>
+ <td>Nitay Artenstein of Exodus Intelligence</td>
+ <td>CVE-2017-9417</td>
+ </tr>
+ <tr>
+ <td>Omer Shwartz of Ben Gurion University Cyber Lab</td>
+ <td>CVE-2017-0650</td>
+ </tr>
+ <tr>
+ <td>Peide Zhang of Vulpecker Team, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2017-0618, CVE-2017-0625</td>
+ </tr>
+ <tr>
+ <td>Peng Xiao of Alibaba Mobile Security Group</td>
+ <td>CVE-2016-10280, CVE-2016-10281, CVE-2017-0463, CVE-2017-0506,
+CVE-2017-0565</td>
+ </tr>
+ <tr>
+ <td>Pengfei Ding (丁鹏飞) of Baidu X-Lab (百度安全实验室)</td>
+ <td>CVE-2016-8417, CVE-2016-10236, CVE-2017-0728, CVE-2017-0738,
+CVE-2017-0766, CVE-2017-0794, CVE-2017-9681, CVE-2017-9684, CVE-2017-9693,
+CVE-2017-9694, CVE-2017-9715, CVE-2017-9717,
+CVE-2017-9720, CVE-2017-11001, CVE-2017-10999, CVE-2017-11057,
+CVE-2017-11060, CVE-2017-11061, CVE-2017-11064</td>
+ </tr>
+ <tr>
+ <td>Peter Pi of Tencent Security Platform Department</td>
+ <td>CVE-2017-11046</td>
+ </tr>
+ <tr>
+ <td>Peter Pi (<a href="https://twitter.com/heisecode">@heisecode</a>) of
+Trend Micro</td>
+ <td>CVE-2016-8424, CVE-2016-8428, CVE-2016-8429, CVE-2016-8460,
+CVE-2016-8469, CVE-2016-8473, CVE-2016-8474</td>
+ </tr>
+ <tr>
+ <td><a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360
+Technology Co. Ltd.</td>
+ <td>CVE-2016-5346, CVE-2016-8416, CVE-2016-8464, CVE-2016-8475,
+CVE-2016-8478, CVE-2016-10285, CVE-2016-10288, CVE-2016-10290, CVE-2016-10294,
+CVE-2016-10295, CVE-2016-10296, CVE-2017-0329, CVE-2017-0332, CVE-2017-0432,
+CVE-2017-0434, CVE-2017-0445, CVE-2017-0446, CVE-2017-0447, CVE-2017-0458,
+CVE-2017-0459, CVE-2017-0500, CVE-2017-0501, CVE-2017-0502, CVE-2017-0503,
+CVE-2017-0509, CVE-2017-0518, CVE-2017-0519, CVE-2017-0524, CVE-2017-0529,
+CVE-2017-0533, CVE-2017-0534, CVE-2017-0536, CVE-2017-0566, CVE-2017-0573,
+CVE-2017-0581, CVE-2017-0616, CVE-2017-0617, CVE-2017-0624, CVE-2017-0649,
+CVE-2017-0744, CVE-2017-6425, CVE-2017-6426, CVE-2017-8233, CVE-2017-8243,
+CVE-2017-8261, CVE-2017-8266, CVE-2017-8268, CVE-2017-8270, CVE-2017-9691,
+CVE-2017-10997</td>
+ </tr>
+ <tr>
+ <td>Qidan He (何淇丹) (<a
+href="https://twitter.com/flanker_hqd">@flanker_hqd</a>) of KeenLab, Tencent
+(腾讯科恩实验室)</td>
+ <td>CVE-2017-0325, CVE-2017-0337, CVE-2017-0382, CVE-2017-0427,
+CVE-2017-0476, CVE-2017-0544</td>
+ </tr>
+ <tr>
+ <td>Qing Zhang of Qihoo 360</td>
+ <td>CVE-2017-0496</td>
+ </tr>
+ <tr>
+ <td>Qiwu Huang of Xiaomi Inc.</td>
+ <td>CVE-2016-10276</td>
+ </tr>
+ <tr>
+ <td>Quhe of Ant-financial Light-Year Security Lab (蚂蚁金服巴斯光年安全实验室)</td>
+ <td>CVE-2017-0522</td>
+ </tr>
+ <tr>
+ <td>Roee Hay (<a href="https://twitter.com/roeehay">@rooehay</a>) of Aleph
+Research, HCL Technologies</td>
+ <td>CVE-2016-10277, CVE-2017-0563, CVE-2017-0582, CVE-2017-0648</td>
+ </tr>
+ <tr>
+ <td>Roee Hay of IBM Security X-Force Research</td>
+ <td>CVE-2016-8467, CVE-2017-0510</td>
+ </tr>
+ <tr>
+ <td>Sagi Kedmi of IBM Security X-Force Research</td>
+ <td>CVE-2017-0433, CVE-2017-0510</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:keun-o.park@darkmatter.ae">Sahara</a> of Secure
+Communications in DarkMatter</td>
+ <td>CVE-2017-0528</td>
+ </tr>
+ <tr>
+ <td>salls (<a href="https://twitter.com/chris_salls">@chris_salls</a>) of
+Shellphish Grill Team, UC Santa Barbara</td>
+ <td>CVE-2017-0505</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:sbauer@plzdonthack.me">Scott Bauer</a> (<a
+href="https://twitter.com/ScottyBauer1">@ScottyBauer1</a>)</td>
+ <td>CVE-2016-10274, CVE-2017-0339, CVE-2017-0405, CVE-2017-0504,
+CVE-2017-0516, CVE-2017-0521, CVE-2017-0562, CVE-2017-0576, CVE-2017-0705,
+CVE-2017-8259, CVE-2017-8260, CVE-2017-9680, CVE-2017-11053</td>
+ </tr>
+ <tr>
+ <td>Sean Beaupre (<a
+href="https://twitter.com/firewaterdevs">@firewaterdevs</a>)</td>
+ <td>CVE-2016-8461, CVE-2016-8462, CVE-2017-0455</td>
+ </tr>
+ <tr>
+ <td>Seven Shen (<a href="https://twitter.com/lingtongshen">@lingtongshen</a>)
+of Trend Micro Mobile Threat Research Team</td>
+ <td>CVE-2016-8418, CVE-2016-8466, CVE-2016-10231, CVE-2017-0449,
+CVE-2017-0452, CVE-2017-0578, CVE-2017-0586, CVE-2017-0724, CVE-2017-0772,
+CVE-2017-0780, CVE-2017-6247, CVE-2017-6248, CVE-2017-6249, CVE-2017-7369</td>
+ </tr>
+ <tr>
+ <td>Shinichi Matsumoto of Fujitsu</td>
+ <td>CVE-2017-0498</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:smarques84@gmail.com">Stéphane Marques</a> of <a
+href="http://www.byterev.com/">ByteRev</a></td>
+ <td>CVE-2017-0489</td>
+ </tr>
+ <tr>
+ <td>Stephen Morrow</td>
+ <td>CVE-2017-0389</td>
+ </tr>
+ <tr>
+ <td>Svetoslav Ganov of Google</td>
+ <td>CVE-2017-0492</td>
+ </tr>
+ <tr>
+ <td>Tim Becker</td>
+ <td>CVE-2017-0546</td>
+ </tr>
+ <tr>
+ <td>Timothy Becker of CSS Inc.</td>
+ <td>CVE-2017-0667, CVE-2017-0732, CVE-2017-0805</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:segfault5514@gmail.com">Tong Lin</a> of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2016-8425, CVE-2016-8426, CVE-2016-8449, CVE-2016-8479,
+CVE-2016-8481, CVE-2016-10291, CVE-2017-0333, CVE-2017-0428, CVE-2017-0435,
+CVE-2017-0436, CVE-2017-10661</td>
+ </tr>
+ <tr>
+ <td>Uma Sankar Pradhan (<a
+href="https://twitter.com/umasankar_iitd">@umasankar_iitd</a>)</td>
+ <td>CVE-2017-0560</td>
+ </tr>
+ <tr>
+ <td>Valerio Costamagna (<a href="https://twitter.com/vaio_co">@vaio_co</a>)</td>
+ <td>CVE-2017-0712</td>
+ </tr>
+ <tr>
+ <td>Vasily Vasiliev</td>
+ <td>CVE-2017-0589, CVE-2017-0637, CVE-2017-0638, CVE-2017-0642,
+CVE-2017-0675, CVE-2017-0676, CVE-2017-0682, CVE-2017-0683, CVE-2017-0696,
+CVE-2017-0699, CVE-2017-0701, CVE-2017-0702, CVE-2017-0716, CVE-2017-0757</td>
+ </tr>
+ <tr>
+ <td>V.E.O (<a href="https://twitter.com/vysea">@VYSEa</a>) of Mobile Threat
+Research Team, <a href="http://www.trendmicro.com/">Trend Micro</a></td>
+ <td>CVE-2017-0381, CVE-2017-0424, CVE-2017-0466, CVE-2017-0467,
+CVE-2017-0468, CVE-2017-0469, CVE-2017-0470, CVE-2017-0471, CVE-2017-0472,
+CVE-2017-0473, CVE-2017-0482, CVE-2017-0484, CVE-2017-0485, CVE-2017-0486,
+CVE-2017-0487, CVE-2017-0494, CVE-2017-0495, CVE-2017-0538, CVE-2017-0539,
+CVE-2017-0540, CVE-2017-0555, CVE-2017-0556, CVE-2017-0557, CVE-2017-0587,
+CVE-2017-0590, CVE-2017-0600, CVE-2017-0640, CVE-2017-0674, CVE-2017-0677,
+CVE-2017-0679, CVE-2017-0680, CVE-2017-0685, CVE-2017-0686, CVE-2017-0689,
+CVE-2017-0693, CVE-2017-0695, CVE-2017-0713, CVE-2017-0715, CVE-2017-0750,
+CVE-2017-10662, CVE-2017-10663</td>
+ </tr>
+ <tr>
+ <td>wanchouchou of Ant-financial Light-Year Security Lab (蚂蚁金服巴斯光年安全实验室)</td>
+ <td>CVE-2017-0522</td>
+ </tr>
+ <tr>
+ <td>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of
+Alibaba Inc.</td>
+ <td>CVE-2017-0391, CVE-2017-0407, CVE-2017-0549, CVE-2017-0759</td>
+ </tr>
+ <tr>
+ <td>Wenjun Hu of Palo Alto Networks</td>
+ <td>CVE-2017-0752</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:vancouverdou@gmail.com">Wenke Dou</a> of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2017-0384, CVE-2017-0385, CVE-2017-0398, CVE-2017-0400,
+CVE-2017-0401, CVE-2017-0402, CVE-2017-0417, CVE-2017-0418, CVE-2017-0450,
+CVE-2017-0483, CVE-2017-0768, CVE-2017-0779, CVE-2017-0812, CVE-2017-0815,
+CVE-2017-0816</td>
+ </tr>
+ <tr>
+ <td>Wenlin Yang (<a href="https://twitter.com/wenlin_yang">@wenlin_yang</a>)
+of Alpha Team, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2017-0577, CVE-2017-0580</td>
+ </tr>
+ <tr>
+ <td>Wish Wu (<a href="https://twitter.com/wish_wu">@wish_wu</a>) (<a
+href="http://www.weibo.com/wishlinux">吴潍浠</a> 此彼) of Ant-financial Light-Year
+Security Lab</td>
+ <td>CVE-2017-0408, CVE-2017-0477, CVE-2017-11063</td>
+ </tr>
+ <tr>
+ <td>Wolfu (付敬贵) of Tencent Security Platform Department</td>
+ <td>CVE-2017-11050, CVE-2017-11051, CVE-2017-11067</td>
+ </tr>
+ <tr>
+ <td>Xiangqian Zhang of Alibaba Mobile Security Group</td>
+ <td>CVE-2017-0796, CVE-2017-0827</td>
+ </tr>
+ <tr>
+ <td>Xiao Zhang of Palo Alto Networks</td>
+ <td>CVE-2017-0752</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:wisedd@gmail.com">Xiaodong Wang</a> of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2017-0429, CVE-2017-0448</td>
+ </tr>
+ <tr>
+ <td>Xiling Gong of Tencent Security Platform Department</td>
+ <td>CVE-2017-0597, CVE-2017-0708, CVE-2017-8236</td>
+ </tr>
+ <tr>
+ <td>Xingyuan Lin of 360 Marvel Team</td>
+ <td>CVE-2017-0627</td>
+ </tr>
+ <tr>
+ <td>Xuxian Jiang of <a href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2016-8425, CVE-2016-8426, CVE-2016-8430, CVE-2016-8431,
+CVE-2016-8432, CVE-2016-8449, CVE-2016-8435, CVE-2016-8479, CVE-2016-8480,
+CVE-2016-8481, CVE-2016-8482, CVE-2016-10291, CVE-2017-0326, CVE-2017-0333,
+CVE-2017-0383, CVE-2017-0384, CVE-2017-0385, CVE-2017-0398, CVE-2017-0400,
+CVE-2017-0401, CVE-2017-0402, CVE-2017-0417, CVE-2017-0418, CVE-2017-0425,
+CVE-2017-0428, CVE-2017-0429, CVE-2017-0435, CVE-2017-0436, CVE-2017-0444,
+CVE-2017-0448, CVE-2017-0450, CVE-2017-0479, CVE-2017-0480, CVE-2017-0483,
+CVE-2017-0526, CVE-2017-0527, CVE-2017-0651, CVE-2017-0665, CVE-2017-0666,
+CVE-2017-0681, CVE-2017-0684, CVE-2017-0709, CVE-2017-0731, CVE-2017-0737,
+CVE-2017-0739, CVE-2017-0765, CVE-2017-0768, CVE-2017-0769, CVE-2017-0779,
+CVE-2017-0801, CVE-2017-7368, CVE-2017-8264, CVE-2017-10661</td>
+ </tr>
+ <tr>
+ <td>Yan Zhou of Eagleye team, SCC, Huawei</td>
+ <td>CVE-2017-9678</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:bigwyfone@gmail.com">Yanfeng Wang</a> of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2016-8430, CVE-2016-8482</td>
+ </tr>
+ <tr>
+ <td>Yang Cheng of Xiaomi Inc.</td>
+ <td>CVE-2016-10276</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:huahuaisadog@gmail.com">Yang Dai</a> of Vulpecker Team,
+Qihoo 360 Technology Co. Ltd</td>
+ <td>CVE-2017-0795, CVE-2017-0799, CVE-2017-0804, CVE-2017-0803</td>
+ </tr>
+ <tr>
+ <td>Yang Song of Alibaba Mobile Security Group</td>
+ <td>CVE-2016-10280, CVE-2016-10281, CVE-2017-0463, CVE-2017-0506,
+CVE-2017-0565, CVE-2017-0711, CVE-2017-0741, CVE-2017-0742, CVE-2017-0751,
+CVE-2017-0796, CVE-2017-0798, CVE-2017-0800, CVE-2017-0827, CVE-2017-11000,
+CVE-2017-11059</td>
+ </tr>
+ <tr>
+ <td>Yangkang (<a href="https://twitter.com/dnpushme">@dnpushme</a>) of Qex
+Team, Qihoo 360</td>
+ <td>CVE-2017-0647, CVE-2017-0690, CVE-2017-0753</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:yaojun8558363@gmail.com">Yao Jun</a> of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2016-8431, CVE-2016-8432, CVE-2016-8435, CVE-2016-8480</td>
+ </tr>
+ <tr>
+ <td>Yong Wang (王勇) (<a
+href="https://twitter.com/ThomasKing2014">@ThomasKing2014</a>) of Alibaba Inc.</td>
+ <td>CVE-2017-0404, CVE-2017-0588</td>
+ </tr>
+ <tr>
+ <td>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of
+IceSword Lab, Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2016-10289, CVE-2017-0465, CVE-2017-0564, CVE-2017-0746,
+CVE-2017-0749, CVE-2017-7370, CVE-2017-8267, CVE-2017-8269, CVE-2017-8271,
+CVE-2017-8272, CVE-2017-11048, CVE-2017-12146</td>
+ </tr>
+ <tr>
+ <td>Yongke Wang of <a href="http://xlab.tencent.com/">Tencent's Xuanwu
+Lab</a></td>
+ <td>CVE-2017-0729, CVE-2017-0767</td>
+ </tr>
+ <tr>
+ <td>Dr. Yossi Oren of Ben Gurion University Cyber Lab</td>
+ <td>CVE-2017-0650</td>
+ </tr>
+ <tr>
+ <td>Yu Pan of Vulpecker Team, Qihoo 360 Technology Co. Ltd</td>
+ <td>CVE-2016-10282, CVE-2017-0517, CVE-2017-0532, CVE-2017-0615,
+CVE-2017-0618, CVE-2017-0625, CVE-2017-0795, CVE-2017-0799, CVE-2017-0804,
+CVE-2017-0803</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:computernik@gmail.com">Yuan-Tsung Lo</a> of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2016-8425, CVE-2016-8426, CVE-2016-8430, CVE-2016-8431,
+CVE-2016-8432, CVE-2016-8435, CVE-2016-8449, CVE-2016-8479, CVE-2016-8480,
+CVE-2016-8481, CVE-2016-8482, CVE-2016-10291, CVE-2017-0326, CVE-2017-0333,
+CVE-2017-0428, CVE-2017-0429, CVE-2017-0435, CVE-2017-0436, CVE-2017-0444,
+CVE-2017-0448, CVE-2017-0526, CVE-2017-0527, CVE-2017-0651, CVE-2017-0709,
+CVE-2017-0824, CVE-2017-7368, CVE-2017-8264, CVE-2017-10661</td>
+ </tr>
+ <tr>
+ <td>Yuebin Sun of <a href="http://xlab.tencent.com/">Tencent's Xuanwu Lab</a></td>
+ <td>CVE-2017-0767</td>
+ </tr>
+ <tr>
+ <td>Yuqi Lu (<a href="https://twitter.com/nikos233__">@nikos233</a>) of <a
+href="http://c0reteam.org/">C0RE Team</a></td>
+ <td>CVE-2017-0383, CVE-2017-0401, CVE-2017-0417, CVE-2017-0425, CVE-2017-0483</td>
+ </tr>
+ <tr>
+ <td>Yuxiang Li (<a href="https://twitter.com/xbalien29">@Xbalien29</a>) of
+Tencent Security Platform Department</td>
+ <td>CVE-2017-0395, CVE-2017-0669, CVE-2017-0704</td>
+ </tr>
+ <tr>
+ <td>Zach Riggle (<a href="https://twitter.com/ebeip90">@ebeip90</a>) of the
+Android Security Team</td>
+ <td>CVE-2017-0710</td>
+ </tr>
+ <tr>
+ <td>Zhanpeng Zhao (行之) (<a href="https://twitter.com/0xr0ot">@0xr0ot</a>) of
+Security Research Lab, <a href="http://www.cmcm.com/">Cheetah Mobile</a></td>
+ <td>CVE-2016-8451</td>
+ </tr>
+ <tr>
+ <td>Zhe Jin (金哲) of Chengdu Security Response Center, Qihoo 360 Technology
+Co. Ltd.</td>
+ <td>CVE-2017-0758, CVE-2017-0760</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:zhouzhenster@gmail.com">Zhen Zhou</a> (<a
+href="https://twitter.com/henices">@henices</a>) of <a
+href="http://www.nsfocus.com/">NSFocus</a></td>
+ <td>CVE-2017-0406</td>
+ </tr>
+ <tr>
+ <td>Zhi Xu of Palo Alto Networks</td>
+ <td>CVE-2017-0752</td>
+ </tr>
+ <tr>
+ <td><a href="mailto:sundaywind2004@gmail.com">Zhixin Li</a> of <a
+href="http://www.nsfocus.com/">NSFocus</a></td>
+ <td>CVE-2017-0406</td>
+ </tr>
+ <tr>
+ <td><a href="https://weibo.com/ele7enxxh">Zinuo Han</a> from Chengdu Security
+Response Center of Qihoo 360 Technology Co. Ltd.</td>
+ <td>CVE-2017-0475, CVE-2017-0497, CVE-2017-0548, CVE-2017-0678,
+CVE-2017-0691, CVE-2017-0700, CVE-2017-0714, CVE-2017-0718, CVE-2017-0719,
+CVE-2017-0720, CVE-2017-0722, CVE-2017-0725, CVE-2017-0745, CVE-2017-0760,
+CVE-2017-0761, CVE-2017-0764, CVE-2017-0776, CVE-2017-0777, CVE-2017-0778,
+CVE-2017-0813, CVE-2017-0814, CVE-2017-0820, CVE-2017-0823</td>
+ </tr>
+ <tr>
+ <td>Zubin Mithra of Google</td>
+ <td>CVE-2017-0462, CVE-2017-8241</td>
+ </tr>
+</table>
<h2 id="2016">2016</h2>
<div style="LINE-HEIGHT:25px;">
@@ -598,7 +1056,7 @@ Tesla Motors Product Security Team</p>
<p>Peter Pi (<a href="https://twitter.com/heisecode">@heisecode</a>) of Trend Micro</p>
-<a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360</p>
+<p><a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360</p>
<p>Quan Nguyen of Google Information Security Engineer Team</p>
@@ -778,7 +1236,7 @@ of Alibaba Inc.</p>
</div>
-<h2 id=2015>2015</h2>
+<h2 id="2015">2015</h2>
<div style="LINE-HEIGHT:25px;">
<p>Abhishek Arya, Google Chrome Security Team</p>
@@ -883,10 +1341,9 @@ href="http://tonybeltramelli.com/">tonybeltramelli.com</a></p>
<p>Yajin Zhou of C0RE Team from Qihoo 360</p>
-
</div>
-<h2 id=2014>2014</h2>
+<h2 id="2014">2014</h2>
<div style="LINE-HEIGHT:25px;">
<p>Aaron Mangel of <a href="https://banno.com/">Banno</a> (<a
@@ -1026,7 +1483,7 @@ href="https://twitter.com/AndroBugs">@AndroBugs</a>)</p>
</div>
-<h2 id=2013>2013</h2>
+<h2 id="2013">2013</h2>
<div style="LINE-HEIGHT:25px;">
@@ -1092,14 +1549,14 @@ William Roberts</a> (<a href="mailto:bill.c.roberts@gmail.com">bill.c.roberts@gm
<img style="vertical-align:middle" src="../images/tiny-robot.png"
alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
-<p>Xiaorui Pan of Indiana University Bloomington (<a href="mailto:eagle200467@gmail.com">eagle200467@gmail.com</a>)<p>
+<p>Xiaorui Pan of Indiana University Bloomington (<a href="mailto:eagle200467@gmail.com">eagle200467@gmail.com</a>)</p>
<p>XiaoFeng Wang of Indiana University Bloomington (<a href="mailto:xw7@indiana.edu">xw7@indiana.edu</a>)</p>
</div>
-<h2 id=2012>2012</h2>
+<h2 id="2012">2012</h2>
<div style="LINE-HEIGHT:25px;">
@@ -1135,7 +1592,7 @@ alt="Patch Symbol" title="This person contributed code that improved Android sec
</div>
-<h2 id=2011>2011</h2>
+<h2 id="2011">2011</h2>
<div style="LINE-HEIGHT:25px;">
@@ -1143,7 +1600,7 @@ alt="Patch Symbol" title="This person contributed code that improved Android sec
</div>
-<h2 id=2009>2009</h2>
+<h2 id="2009">2009</h2>
<div style="LINE-HEIGHT:25px;">
diff --git a/en/security/selinux/index.html b/en/security/selinux/index.html
index f45d517d..e5ad9a12 100644
--- a/en/security/selinux/index.html
+++ b/en/security/selinux/index.html
@@ -39,83 +39,83 @@ security model</a>, Android uses SELinux to enforce mandatory access control
(a.k.a. Linux capabilities). SELinux enhances Android security by confining
privileged processes and automating security policy creation.</p>
-<p>Contributions to it have been made by a number
-of companies and organizations; all Android code
-and contributors are publicly available for review on <a
-href="https://android.googlesource.com/">android.googlesource.com</a>. With
-SELinux, Android can better protect and confine system services, control
-access to application data and system logs, reduce the effects of malicious
-software, and protect users from potential flaws in code on mobile devices.</p>
-
-<p>Android includes SELinux in enforcing mode and a
-corresponding security policy that works by default across the <a
-href="https://android.googlesource.com/">Android Open Source Project</a>. In
-enforcing mode, illegitimate actions are prevented and all attempted violations
-are logged by the kernel to <code>dmesg</code> and <code>logcat</code>. Android
-device manufacturers should gather information about errors so they may
-refine their software and SELinux policies before enforcing them.</p>
+<p>Many companies and organizations have contributed to SELinux; their
+contributions are publicly available for review on
+<a href="https://android.googlesource.com/" class="external">android.googlesource.com</a>,
+aka the Android Open Source Project (AOSP). With SELinux, Android can better
+protect and confine system services, control access to application data and
+system logs, reduce the effects of malicious software, and protect users from
+potential flaws in code on mobile devices.</p>
+
+<p>Android includes SELinux in enforcing mode and a corresponding security
+policy that works by default across AOSP. In enforcing mode, illegitimate
+actions are prevented and all attempted violations are logged by the kernel to
+<code>dmesg</code> and <code>logcat</code>. Android device manufacturers should
+gather information about errors so they may refine their software and SELinux
+policies before enforcing them.</p>
<h2 id=background>Background</h2>
+<p>SELinux operates on the ethos of default denial: Anything not explicitly
+allowed is denied. SELinux can operate in one of two global modes:</p>
+<ul>
+<li><em>Permissive</em> mode, in which permission denials are logged but not
+enforced.</li>
+<li><em>Enforcing</em> mode, in which permissions denials are both logged
+<strong>and</strong> enforced.</li>
+</ul>
-<p>SELinux operates on the ethos of default denial. Anything that is not
-explicitly allowed is denied. SELinux can operate in one of two global modes:
-permissive mode, in which permission denials are logged but not enforced, and
-enforcing mode, in which denials are both logged and enforced. SELinux also
-supports a per-domain permissive mode in which specific domains (processes) can
-be made permissive while placing the rest of the system in global enforcing
-mode. A domain is simply a label identifying a process or set of processes in
-the security policy, where all processes labeled with the same domain are
-treated identically by the security policy. Per-domain permissive mode enables
-incremental application of SELinux to an ever-increasing portion of the system.
-Per-domain permissive mode also enables policy development for new services
-while keeping the rest of the system enforcing.</p>
-
-<p>In the Android 5.0 (L) release, Android moves to full enforcement of
-SELinux. This builds upon the permissive release of 4.3 and the partial
-enforcement of 4.4. In short, Android is shifting from enforcement on a
-limited set of crucial domains (<code>installd</code>, <code>netd</code>,
-<code>vold</code> and <code>zygote</code>) to everything (more than 60
-domains). This means manufacturers will have to better understand and scale
-their SELinux implementations to provide compatible devices. Understand
-that:</p>
-
+<p>SELinux also supports a <em>per-domain permissive</em> mode in which specific
+domains (processes) can be made permissive while placing the rest of the system
+in global enforcing mode. A domain is simply a label identifying a process or set
+of processes in the security policy, where all processes labeled with the same
+domain are treated identically by the security policy. Per-domain permissive
+mode enables incremental application of SELinux to an ever-increasing portion of
+the system and policy development for new services (while keeping the rest of
+the system enforcing).</p>
+
+<p>The Android 5.0 release moved to full enforcement of SELinux, building on the
+permissive release of Android 4.3 and the partial enforcement of Android 4.4.
+With this change, Android shifted from enforcement on a limited set of crucial
+domains (<code>installd</code>, <code>netd</code>, <code>vold</code> and
+<code>zygote</code>) to everything (more than 60 domains). Specifically:</p>
<ul>
-<li>Everything is in enforcing mode in the 5.0 release</li>
-<li> No processes other than <code>init</code> should run in the
-<code>init</code> domain</li>
-<li> Any generic denial (for a block_device, socket_device, default_service,
-etc.) indicates that device needs a special domain</li>
+<li>Everything is in enforcing mode in Android 5.x and higher.</li>
+<li>No processes other than <code>init</code> should run in the
+<code>init</code> domain.</li>
+<li>Any generic denial (for a <code>block_device</code>,
+<code>socket_device</code>, <code>default_service</code>, etc.) indicates that
+device needs a special domain.</li>
</ul>
+<p>As a result, manufacturers need to better understand and scale their SELinux
+implementations to provide compatible devices.</p>
-<h2 id=supporting_documentation>Supporting documentation</h2>
+<h2 id=supporting_documentation>Additional resources</h2>
-<p>See the documentation below for details on constructing useful policies:</p>
+<p>For help constructing useful SELinux policies, refer to the following
+resources:</p>
-<p><a href="https://events.linuxfoundation.org/sites/events/files/slides/abs2014_seforandroid_smalley.pdf">
-https://events.linuxfoundation.org/sites/events/files/slides/
-abs2014_seforandroid_smalley.pdf</a></p>
+<ul><li><a href="https://events.linuxfoundation.org/sites/events/files/slides/abs2014_seforandroid_smalley.pdf" class="external">
+Security Enhancements for Linux</a></li>
-<p><a href="https://www.internetsociety.org/sites/default/files/02_4.pdf">
-https://www.internetsociety.org/sites/default/files/02_4.pdf</a></p>
+<li><a href="http://www.cs.columbia.edu/~lierranli/coms6998-7Spring2014/papers/SEAndroid-NDSS2013.pdf" class="external">
+Security Enhanced (SE) Android: Bringing Flexible MAC to Android</a></li>
-<p><a href="http://freecomputerbooks.com/books/The_SELinux_Notebook-4th_Edition.pdf">
-http://freecomputerbooks.com/books/The_SELinux_Notebook-4th_Edition.pdf</a></p>
+<li><a href="http://freecomputerbooks.com/books/The_SELinux_Notebook-4th_Edition.pdf" class="external">
+The SELinux Notebook, 4th Edition</a></li>
-<p><a href="http://selinuxproject.org/page/ObjectClassesPerms">
-http://selinuxproject.org/page/ObjectClassesPerms</a></p>
+<li><a href="http://selinuxproject.org/page/ObjectClassesPerms" class="external">
+SELinux Object Classes and Permissions Reference</a></li>
-<p><a href="https://www.nsa.gov/resources/everyone/digital-media-center/publications/research-papers/assets/files/implementing-selinux-as-linux-security-module-report.pdf">
-https://www.nsa.gov/resources/everyone/digital-media-center/publications/
-research-papers/assets/files/
-implementing-selinux-as-linux-security-module-report.pdf</a></p>
+<li><a href="https://www.nsa.gov/resources/everyone/digital-media-center/publications/research-papers/assets/files/implementing-selinux-as-linux-security-module-report.pdf" class="external">
+Implementing SELinux as a Linux Security Module</a></li>
-<p><a href="https://www.nsa.gov/resources/everyone/digital-media-center/publications/research-papers/assets/files/configuring-selinux-policy-report.pdf">
-https://www.nsa.gov/resources/everyone/digital-media-center/publications/
-research-papers/assets/files/configuring-selinux-policy-report.pdf</a></p>
+<li><a href="https://www.nsa.gov/resources/everyone/digital-media-center/publications/research-papers/assets/files/configuring-selinux-policy-report.pdf" class="external">
+Configuring the SELinux Policy</a></li>
-<p><a href="https://www.gnu.org/software/m4/manual/index.html">
-https://www.gnu.org/software/m4/manual/index.html</a></p>
+<li><a href="https://www.gnu.org/software/m4/manual/index.html" class="external">
+GNU M4 - GNU Macro Processor Manual</a></li>
+</ul>
</body>
</html>