Home | History | Annotate | Download | only in bulletin
      1 <html devsite>
      2   <head>
      3     <title>Android Security BulletinJuly 2017</title>
      4     <meta name="project_path" value="/_project.yaml" />
      5     <meta name="book_path" value="/_book.yaml" />
      6   </head>
      7   <body>
      8   <!--
      9       Copyright 2017 The Android Open Source Project
     10 
     11       Licensed under the Apache License, Version 2.0 (the "License");
     12       you may not use this file except in compliance with the License.
     13       You may obtain a copy of the License at
     14 
     15           //www.apache.org/licenses/LICENSE-2.0
     16 
     17       Unless required by applicable law or agreed to in writing, software
     18       distributed under the License is distributed on an "AS IS" BASIS,
     19       WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     20       See the License for the specific language governing permissions and
     21       limitations under the License.
     22   -->
     23 <p><em>Published July 5, 2017 | Updated July 6, 2017</em></p>
     24 
     25 <p>The Android Security Bulletin contains details of security vulnerabilities
     26 affecting Android devices. Security patch levels of July 05, 2017 or later
     27 address all of these issues. Refer to the <a
     28 href="//support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
     29 and Nexus update schedule</a> to learn how to check a device's security patch
     30 level.</p>
     31 
     32 <p>Partners were notified of the issues described in the bulletin at least a month
     33 ago. Source code patches for these issues have been released to the Android Open
     34 Source Project (AOSP) repository and linked from this bulletin. This bulletin also
     35 includes links to patches outside of AOSP.</p>
     36 
     37 <p>The most severe of these issues is a critical security vulnerability in media
     38 framework that could enable a remote attacker using a specially crafted file to
     39 execute arbitrary code within the context of a privileged process. The <a
     40 href="/security/overview/updates-resources.html#severity">severity
     41 assessment</a> is based on the effect that exploiting the vulnerability would
     42 possibly have on an affected device, assuming the platform and service
     43 mitigations are turned off for development purposes or if successfully bypassed.</p>
     44 
     45 <p>We have had no reports of active customer exploitation or abuse of these newly
     46 reported issues. Refer to the <a
     47 href="#mitigations">Android and Google Play
     48 Protect mitigations</a> section for details on the <a
     49 href="/security/enhancements/index.html">Android
     50 security platform protections</a> and Google Play Protect, which improve the
     51 security of the Android platform.</p>
     52 
     53 <p>We encourage all customers to accept these updates to their devices.</p>
     54 
     55 <p class="note"><strong>Note:</strong> Information on the latest over-the-air
     56 update (OTA) and firmware images for Google devices is available in the
     57 <a href="#google-device-updates">Google device updates</a> section.</p>
     58 
     59 <h2 id="announcements">Announcements</h2>
     60 <ul>
     61   <li>This bulletin has two security patch level strings to provide Android
     62   partners with the flexibility to more quickly fix a subset of vulnerabilities
     63   that are similar across all Android devices. See <a
     64   href="#common-questions-and-answers">Common questions and answers</a> for
     65   additional information:
     66     <ul>
     67        <li><strong>2017-07-01</strong>: Partial security patch level string. This
     68       security patch level string indicates that all issues associated with 2017-07-01
     69       (and all previous security patch level strings) are addressed.</li>
     70        <li><strong>2017-07-05</strong>: Complete security patch level string. This
     71       security patch level string indicates that all issues associated with 2017-07-01
     72       and 2017-07-05 (and all previous security patch level strings) are
     73       addressed.</li>
     74     </ul>
     75   </li>
     76 </ul>
     77 
     78 <h2 id="mitigations">Android and Google Play Protect mitigations</h2>
     79 <p>This is a summary of the mitigations provided by the <a
     80 href="/security/enhancements/index.html">Android
     81 security platform</a> and service protections such as <a
     82 href="//www.android.com/play-protect">Google Play Protect</a>. These
     83 capabilities reduce the likelihood that security vulnerabilities could be
     84 successfully exploited on Android.</p>
     85 <ul>
     86   <li>Exploitation for many issues on Android is made more difficult by
     87   enhancements in newer versions of the Android platform. We encourage all users
     88   to update to the latest version of Android where possible.</li>
     89   <li>The Android security team actively monitors for abuse through <a
     90   href="//www.android.com/play-protect">Google Play Protect</a> and warns
     91   users about <a
     92   href="/security/reports/Google_Android_Security_PHA_classifications.pdf">Potentially
     93   Harmful Applications</a>. Google Play Protect is enabled by default on devices
     94   with <a href="//www.android.com/gms">Google Mobile Services</a>, and is
     95   especially important for users who install apps from outside of Google Play.
     96   </li>
     97 </ul>
     98 
     99 <h2 id="2017-07-01-details">2017-07-01 security patch levelVulnerability details</h2>
    100 <p>In the sections below, we provide details for each of the security
    101 vulnerabilities that apply to the 2017-07-01 patch level. Vulnerabilities are
    102 grouped under the component that they affect. There is a description of the
    103 issue and a table with the CVE, associated references, <a
    104 href="#common-questions-and-answers">type of vulnerability</a>, <a
    105 href="/security/overview/updates-resources.html#severity">severity</a>,
    106 and updated AOSP versions (where applicable). When available, we link the public
    107 change that addressed the issue to the bug ID, like the AOSP change list. When
    108 multiple changes relate to a single bug, additional references are linked to
    109 numbers following the bug ID.</p>
    110 
    111 <h3 id="runtime">Runtime</h3>
    112 <p>The most severe vulnerability in this section could enable a remote attacker
    113 using a specially crafted file to execute arbitrary code within the context of
    114 an unprivileged process.</p>
    115 
    116 <table>
    117   <col width="17%">
    118   <col width="19%">
    119   <col width="9%">
    120   <col width="14%">
    121   <col width="39%">
    122   <tr>
    123    <th>CVE</th>
    124    <th>References</th>
    125    <th>Type</th>
    126    <th>Severity</th>
    127    <th>Updated AOSP versions</th>
    128   </tr>
    129   <tr>
    130    <td>CVE-2017-3544</td>
    131    <td><a href="https://android.googlesource.com/platform/libcore/+/c5dd90d62590425f04a261e0f6c927acca147f88">
    132        A-35784677</a></td>
    133    <td>RCE</td>
    134    <td>Moderate</td>
    135    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    136   </tr>
    137 </table>
    138 <h3 id="framework">Framework</h3>
    139 <p>The most severe vulnerability in this section could enable a local malicious
    140 application using a specially crafted file to execute arbitrary code within the
    141 context of an application that uses the library.</p>
    142 
    143 <table>
    144   <col width="17%">
    145   <col width="19%">
    146   <col width="9%">
    147   <col width="14%">
    148   <col width="39%">
    149   <tr>
    150    <th>CVE</th>
    151    <th>References</th>
    152    <th>Type</th>
    153    <th>Severity</th>
    154    <th>Updated AOSP versions</th>
    155   </tr>
    156   <tr>
    157    <td>CVE-2017-0664</td>
    158    <td><a href="https://android.googlesource.com/platform/frameworks/base/+/59773dc2f213c3e645c7e04881afa0a8e6ffccca">
    159        A-36491278</a></td>
    160    <td>EoP</td>
    161    <td>High</td>
    162    <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    163   </tr>
    164   <tr>
    165    <td>CVE-2017-0665</td>
    166    <td><a href="https://android.googlesource.com/platform/frameworks/native/+/75edf04bf18d37df28fb58e1d75331ed4bcae230">
    167        A-36991414</a></td>
    168    <td>EoP</td>
    169    <td>High</td>
    170    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    171   </tr>
    172   <tr>
    173    <td>CVE-2017-0666</td>
    174    <td><a href="https://android.googlesource.com/platform/frameworks/native/+/5fc2df253c089b53b3e235a3f237f96a98b53977">
    175        A-37285689</a></td>
    176    <td>EoP</td>
    177    <td>High</td>
    178    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    179   </tr>
    180   <tr>
    181    <td>CVE-2017-0667</td>
    182    <td><a href="https://android.googlesource.com/platform/frameworks/native/+/5ac63e4547feaa7cb51ac81896250f47f367ffba">
    183        A-37478824</a></td>
    184    <td>EoP</td>
    185    <td>High</td>
    186    <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    187   </tr>
    188   <tr>
    189    <td>CVE-2017-0668</td>
    190    <td><a href="https://android.googlesource.com/platform/packages/providers/DownloadProvider/+/b3e3325d23289a94e66d8ce36a53a7ccf7b52c6d">
    191        A-22011579</a></td>
    192    <td>ID</td>
    193    <td>Moderate</td>
    194    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    195   </tr>
    196   <tr>
    197    <td>CVE-2017-0669</td>
    198    <td><a href="https://android.googlesource.com/platform/packages/providers/MediaProvider/+/7b7ef84234cd3daea0e22025b908b0041885736c">
    199        A-34114752</a></td>
    200    <td>ID</td>
    201    <td>High</td>
    202    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    203   </tr>
    204   <tr>
    205    <td>CVE-2017-0670</td>
    206    <td><a href="https://android.googlesource.com/platform/bionic/+/e102faee8b2f87c28616e7f5453f9a11eea9b122">
    207        A-36104177</a></td>
    208    <td>DoS</td>
    209    <td>High</td>
    210    <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    211   </tr>
    212 </table>
    213 <h3 id="libraries">Libraries</h3>
    214 <p>The most severe vulnerability in this section could enable a remote attacker
    215 using a specially crafted file to execute arbitrary code within the context of
    216 an application that uses the library.</p>
    217 
    218 <table>
    219   <col width="17%">
    220   <col width="19%">
    221   <col width="9%">
    222   <col width="14%">
    223   <col width="39%">
    224   <tr>
    225    <th>CVE</th>
    226    <th>References</th>
    227    <th>Type</th>
    228    <th>Severity</th>
    229    <th>Updated AOSP versions</th>
    230   </tr>
    231   <tr>
    232    <td>CVE-2017-0671</td>
    233    <td>A-34514762<a href="#asterisk">*</a></td>
    234    <td>RCE</td>
    235    <td>High</td>
    236    <td>4.4.4</td>
    237   </tr>
    238   <tr>
    239    <td>CVE-2016-2109</td>
    240    <td><a href="https://android.googlesource.com/platform/external/boringssl/+/ccb2efe8d3fccb4321e85048d67c8528e03d4652">
    241        A-35443725</a></td>
    242    <td>DoS</td>
    243    <td>High</td>
    244    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    245   </tr>
    246   <tr>
    247    <td>CVE-2017-0672</td>
    248    <td><a href="https://android.googlesource.com/platform/external/skia/+/c4087ff5486d36a690c681affb668164ec0dd697">
    249        A-34778578</a></td>
    250    <td>DoS</td>
    251    <td>High</td>
    252    <td>7.0, 7.1.1, 7.1.2</td>
    253   </tr>
    254 </table>
    255 <h3 id="media-framework">Media framework</h3>
    256 <p>The most severe vulnerability in this section could enable a remote attacker
    257 using a specially crafted file to execute arbitrary code within the context of
    258 a privileged process.</p>
    259 
    260 <table>
    261   <col width="17%">
    262   <col width="19%">
    263   <col width="9%">
    264   <col width="14%">
    265   <col width="39%">
    266   <tr>
    267    <th>CVE</th>
    268    <th>References</th>
    269    <th>Type</th>
    270    <th>Severity</th>
    271    <th>Updated AOSP versions</th>
    272   </tr>
    273   <tr>
    274    <td>CVE-2017-0540</td>
    275    <td><a href="https://android.googlesource.com/platform/external/libhevc/+/a92b39ff0c47d488b81fecd62ba85e48d386aa68">
    276        A-33966031</a></td>
    277    <td>RCE</td>
    278    <td>Critical</td>
    279    <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    280   </tr>
    281   <tr>
    282    <td>CVE-2017-0673</td>
    283    <td><a href="https://android.googlesource.com/platform/external/libavc/+/381ccb2b7f2ba42490bafab6aa7a63a8212b396f">
    284        A-33974623</a></td>
    285    <td>RCE</td>
    286    <td>Critical</td>
    287    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    288   </tr>
    289   <tr>
    290    <td>CVE-2017-0674</td>
    291    <td><a href="https://android.googlesource.com/platform/external/libmpeg2/+/1603112cccbab3dff66a7eb1b82e858c1749f34b">
    292        A-34231163</a></td>
    293    <td>RCE</td>
    294    <td>Critical</td>
    295    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    296   </tr>
    297   <tr>
    298    <td>CVE-2017-0675</td>
    299    <td><a href="https://android.googlesource.com/platform/external/libhevc/+/726108468dcfdabb833b8d55333de53cf6350aaa">
    300        A-34779227</a>
    301       [<a href="https://android.googlesource.com/platform/external/libhevc/+/4395fc2288e3f692765c73fce416e831fdaa5463">2</a>]</td>
    302    <td>RCE</td>
    303    <td>Critical</td>
    304    <td>6.0.1, 7.0, 7.1.1, 7.1.2</td>
    305   </tr>
    306   <tr>
    307    <td>CVE-2017-0676</td>
    308    <td><a href="https://android.googlesource.com/platform/external/libhevc/+/8e415eabb5d2abd2f2bd40a675339d967f81521b">
    309        A-34896431</a></td>
    310    <td>RCE</td>
    311    <td>Critical</td>
    312    <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    313   </tr>
    314   <tr>
    315    <td>CVE-2017-0677</td>
    316    <td><a href="https://android.googlesource.com/platform/external/libavc/+/b8fee6a6d0a91fb5ddca8f54b0c891e25c1b65ae">
    317        A-36035074</a></td>
    318    <td>RCE</td>
    319    <td>Critical</td>
    320    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    321   </tr>
    322   <tr>
    323    <td>CVE-2017-0678</td>
    324    <td><a href="https://android.googlesource.com/platform/frameworks/av/+/64bc0b8c0c495c487604d483aa57978db7f634be">
    325        A-36576151</a></td>
    326    <td>RCE</td>
    327    <td>Critical</td>
    328    <td>7.0, 7.1.1, 7.1.2</td>
    329   </tr>
    330   <tr>
    331    <td>CVE-2017-0679</td>
    332    <td><a href="https://android.googlesource.com/platform/external/libavc/+/91cb6b1745f3e9d341cf6decc2b916cb1e4eea77">
    333        A-36996978</a></td>
    334    <td>RCE</td>
    335    <td>Critical</td>
    336    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    337   </tr>
    338   <tr>
    339    <td>CVE-2017-0680</td>
    340    <td><a href="https://android.googlesource.com/platform/external/libavc/+/989df73b34a7a698731cab3ee1e4a831a862fbe1">
    341        A-37008096</a></td>
    342    <td>RCE</td>
    343    <td>Critical</td>
    344    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    345   </tr>
    346   <tr>
    347    <td>CVE-2017-0681</td>
    348    <td><a href="https://android.googlesource.com/platform/external/tremolo/+/822af05a1364d8dc6189dce5380a2703214dd799">
    349        A-37208566</a></td>
    350    <td>RCE</td>
    351    <td>Critical</td>
    352    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    353   </tr>
    354   <tr>
    355    <td>CVE-2017-0682</td>
    356    <td>A-36588422<a href="#asterisk">*</a></td>
    357    <td>RCE</td>
    358    <td>High</td>
    359    <td>7.0, 7.1.1, 7.1.2</td>
    360   </tr>
    361   <tr>
    362    <td>CVE-2017-0683</td>
    363    <td>A-36591008<a href="#asterisk">*</a></td>
    364    <td>RCE</td>
    365    <td>High</td>
    366    <td>7.0, 7.1.1, 7.1.2</td>
    367   </tr>
    368   <tr>
    369    <td>CVE-2017-0684</td>
    370    <td><a href="https://android.googlesource.com/platform/frameworks/av/+/c7c9271740c29c02e7926265ed53a44b8113dbfb">
    371        A-35421151</a></td>
    372    <td>EoP</td>
    373    <td>High</td>
    374    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    375   </tr>
    376   <tr>
    377    <td>CVE-2017-0685</td>
    378    <td><a href="https://android.googlesource.com/platform/external/libmpeg2/+/680b75dabb90c8c2e22886826554ad1bc99b36f1">
    379        A-34203195</a></td>
    380    <td>DoS</td>
    381    <td>High</td>
    382    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    383   </tr>
    384   <tr>
    385    <td>CVE-2017-0686</td>
    386    <td><a href="https://android.googlesource.com/platform/external/libmpeg2/+/b8d7e85c10cc22e1a5d81ec3d8a2e5bdd6102852">
    387        A-34231231</a></td>
    388    <td>DoS</td>
    389    <td>High</td>
    390    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    391   </tr>
    392   <tr>
    393    <td>CVE-2017-0688</td>
    394    <td><a href="https://android.googlesource.com/platform/external/libavc/+/62c07468bc26d1f9487c5298bb2a2f3740db13b1">
    395        A-35584425</a></td>
    396    <td>DoS</td>
    397    <td>High</td>
    398    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    399   </tr>
    400   <tr>
    401    <td>CVE-2017-0689</td>
    402    <td><a href="https://android.googlesource.com/platform/external/libhevc/+/2210ff5600d3f965352a3074adff8fedddcf347e">
    403        A-36215950</a></td>
    404    <td>DoS</td>
    405    <td>High</td>
    406    <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    407   </tr>
    408   <tr>
    409    <td>CVE-2017-0690</td>
    410    <td><a href="https://android.googlesource.com/platform/frameworks/av/+/1f418f10f4319fc829360b7efee7fca4b3880867">
    411        A-36592202</a></td>
    412    <td>DoS</td>
    413    <td>High</td>
    414    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    415   </tr>
    416   <tr>
    417    <td>CVE-2017-0691</td>
    418    <td><a href="https://android.googlesource.com/platform/external/dng_sdk/+/c70264282305351abbec9b967333db4d896583b9">
    419        A-36724453</a></td>
    420    <td>DoS</td>
    421    <td>High</td>
    422    <td>7.0, 7.1.1, 7.1.2</td>
    423   </tr>
    424   <tr>
    425    <td>CVE-2017-0692</td>
    426    <td><a href="https://android.googlesource.com/platform/external/sonivox/+/6db482687caf12ea7d2d07d655b17413bc937c73">
    427        A-36725407</a></td>
    428    <td>DoS</td>
    429    <td>High</td>
    430    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    431   </tr>
    432   <tr>
    433    <td>CVE-2017-0693</td>
    434    <td><a href="https://android.googlesource.com/platform/external/libavc/+/632ff754836d22415136cb3f97fe4622c862ce81">
    435        A-36993291</a></td>
    436    <td>DoS</td>
    437    <td>High</td>
    438    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    439   </tr>
    440   <tr>
    441    <td>CVE-2017-0694</td>
    442    <td><a href="https://android.googlesource.com/platform/external/sonivox/+/47750a5f1b19695ac64d6f7aa6e7e0918d3c8977">
    443        A-37093318</a></td>
    444    <td>DoS</td>
    445    <td>High</td>
    446    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    447   </tr>
    448   <tr>
    449    <td>CVE-2017-0695</td>
    450    <td><a href="https://android.googlesource.com/platform/external/libhevc/+/cc5683451dd9be1491b54f215e9934d49f11cf70">
    451        A-37094889</a></td>
    452    <td>DoS</td>
    453    <td>High</td>
    454    <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    455   </tr>
    456   <tr>
    457    <td>CVE-2017-0696</td>
    458    <td><a href="https://android.googlesource.com/platform/external/libavc/+/0d0ddb7cd7618ede5301803c526f066b95ce5089">
    459        A-37207120</a></td>
    460    <td>DoS</td>
    461    <td>High</td>
    462    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    463   </tr>
    464   <tr>
    465    <td>CVE-2017-0697</td>
    466    <td><a href="https://android.googlesource.com/platform/frameworks/av/+/c5eaf3ae70d5ea3a7d390294002e4cf9859b3578">
    467        A-37239013</a></td>
    468    <td>DoS</td>
    469    <td>High</td>
    470    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    471   </tr>
    472   <tr>
    473    <td>CVE-2017-0698</td>
    474    <td><a href="https://android.googlesource.com/platform/frameworks/av/+/1618337cac09284fddb5bb14b5e0cfe2946d3431">
    475        A-35467458</a></td>
    476    <td>ID</td>
    477    <td>Moderate</td>
    478    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    479   </tr>
    480   <tr>
    481    <td>CVE-2017-0699</td>
    482    <td><a href="https://android.googlesource.com/platform/external/libavc/+/989b2afc3ebb1bbb4c962e2aff1fd9b3149f83f1">
    483        A-36490809</a></td>
    484    <td>ID</td>
    485    <td>Moderate</td>
    486    <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    487   </tr>
    488 </table>
    489 <h3 id="system-ui">System UI</h3>
    490 <p>The most severe vulnerability in this section could enable a remote attacker
    491 using a specially crafted file to execute arbitrary code within the context of a
    492 privileged process.</p>
    493 
    494 <table>
    495   <col width="17%">
    496   <col width="19%">
    497   <col width="9%">
    498   <col width="14%">
    499   <col width="39%">
    500   <tr>
    501    <th>CVE</th>
    502    <th>References</th>
    503    <th>Type</th>
    504    <th>Severity</th>
    505    <th>Updated AOSP versions</th>
    506   </tr>
    507   <tr>
    508    <td>CVE-2017-0700</td>
    509    <td><a href="https://android.googlesource.com/platform/external/libgdx/+/38889ebd9b9c682bd1b64fd251ecd69b504a6155">
    510        A-35639138</a></td>
    511    <td>RCE</td>
    512    <td>High</td>
    513    <td>7.1.1, 7.1.2</td>
    514   </tr>
    515   <tr>
    516    <td>CVE-2017-0701</td>
    517    <td><a href="https://android.googlesource.com/platform/external/libgdx/+/85e94f5b67c1beb9402c4de82bd481a5202470de">
    518        A-36385715</a>
    519       [<a href="https://android.googlesource.com/platform/external/libgdx/+/bd4c825d8fc5dd48f5c602e673ae210909b31fd0">2</a>]</td>
    520    <td>RCE</td>
    521    <td>High</td>
    522    <td>7.1.1, 7.1.2</td>
    523   </tr>
    524   <tr>
    525    <td>CVE-2017-0702</td>
    526    <td><a href="https://android.googlesource.com/platform/external/libgdx/+/5d46e9a1784c02f347af107a978fe9fbd7af7fb2">
    527        A-36621442</a></td>
    528    <td>RCE</td>
    529    <td>High</td>
    530    <td>7.1.1, 7.1.2</td>
    531   </tr>
    532   <tr>
    533    <td>CVE-2017-0703</td>
    534    <td><a href="https://android.googlesource.com/platform/packages/apps/Settings/+/4af8f912aa1ee714638d0f9694d6f856bc8166f3">
    535        A-33123882</a></td>
    536    <td>EoP</td>
    537    <td>High</td>
    538    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    539   </tr>
    540   <tr>
    541    <td>CVE-2017-0704</td>
    542    <td><a href="https://android.googlesource.com/platform/packages/apps/Settings/+/179f0e9512100b0a403aab8b2b4cf5510bb20bee">
    543        A-33059280</a></td>
    544    <td>EoP</td>
    545    <td>Moderate</td>
    546    <td>7.1.1, 7.1.2</td>
    547   </tr>
    548 </table>
    549 
    550 <h2 id="2017-07-05-details">2017-07-05 security patch levelVulnerability details</h2>
    551 <p>In the sections below, we provide details for each of the security
    552 vulnerabilities that apply to the 2017-07-05 patch level. Vulnerabilities are
    553 grouped under the component that they affect and include details such as the
    554 CVE, associated references, <a href="#common-questions-and-answers">type of
    555 vulnerability</a>, <a
    556 href="/security/overview/updates-resources.html#severity">severity</a>,
    557 component (where applicable), and updated AOSP versions (where applicable). When
    558 available, we link the public change that addressed the issue to the bug ID,
    559 like the AOSP change list. When multiple changes relate to a single bug,
    560 additional references are linked to numbers following the bug ID.</p>
    561 
    562 <h3 id="broadcom-components">Broadcom components</h3>
    563 <p>The most severe vulnerability in this section could enable a proximate attacker
    564 to execute arbitrary code within the context of the kernel.</p>
    565 
    566 <table>
    567   <col width="17%">
    568   <col width="19%">
    569   <col width="9%">
    570   <col width="14%">
    571   <col width="39%">
    572   <tr>
    573    <th>CVE</th>
    574    <th>References</th>
    575    <th>Type</th>
    576    <th>Severity</th>
    577    <th>Component</th>
    578   </tr>
    579   <tr>
    580    <td>CVE-2017-9417</td>
    581    <td>A-38041027<a href="#asterisk">*</a><br>
    582        B-RB#123023</td>
    583    <td>RCE</td>
    584    <td>Critical</td>
    585    <td>Wi-Fi driver</td>
    586   </tr>
    587   <tr>
    588    <td>CVE-2017-0705</td>
    589    <td>A-34973477<a href="#asterisk">*</a><br>
    590        B-RB#119898</td>
    591    <td>EoP</td>
    592    <td>Moderate</td>
    593    <td>Wi-Fi driver</td>
    594   </tr>
    595   <tr>
    596    <td>CVE-2017-0706</td>
    597    <td>A-35195787<a href="#asterisk">*</a><br>
    598        B-RB#120532</td>
    599    <td>EoP</td>
    600    <td>Moderate</td>
    601    <td>Wi-Fi driver</td>
    602   </tr>
    603 </table>
    604 <h3 id="htc-components">HTC components</h3>
    605 <p>The most severe vulnerability in this section could enable a local malicious
    606 application to execute arbitrary code within the context of a privileged
    607 process.</p>
    608 
    609 <table>
    610   <col width="17%">
    611   <col width="19%">
    612   <col width="9%">
    613   <col width="14%">
    614   <col width="39%">
    615   <tr>
    616    <th>CVE</th>
    617    <th>References</th>
    618    <th>Type</th>
    619    <th>Severity</th>
    620    <th>Component</th>
    621   </tr>
    622   <tr>
    623    <td>CVE-2017-0707</td>
    624    <td>A-36088467<a href="#asterisk">*</a></td>
    625    <td>EoP</td>
    626    <td>Moderate</td>
    627    <td>LED driver</td>
    628   </tr>
    629   <tr>
    630    <td>CVE-2017-0708</td>
    631    <td>A-35384879<a href="#asterisk">*</a></td>
    632    <td>ID</td>
    633    <td>Moderate</td>
    634    <td>Sound driver</td>
    635   </tr>
    636   <tr>
    637    <td>CVE-2017-0709</td>
    638    <td>A-35468048<a href="#asterisk">*</a></td>
    639    <td>ID</td>
    640    <td>Low</td>
    641    <td>Sensor hub driver</td>
    642   </tr>
    643 </table>
    644 <h3 id="kernel-components">Kernel components</h3>
    645 <p>The most severe vulnerability in this section could enable a local malicious
    646 application to execute arbitrary code within the context of a privileged
    647 process.</p>
    648 
    649 <table>
    650   <col width="17%">
    651   <col width="19%">
    652   <col width="9%">
    653   <col width="14%">
    654   <col width="39%">
    655   <tr>
    656    <th>CVE</th>
    657    <th>References</th>
    658    <th>Type</th>
    659    <th>Severity</th>
    660    <th>Component</th>
    661   </tr>
    662   <tr>
    663    <td>CVE-2017-6074</td>
    664    <td>A-35784697<br>
    665 <a href="//git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4">Upstream
    666 kernel</a></td>
    667    <td>EoP</td>
    668    <td>High</td>
    669    <td>Networking subsystem</td>
    670   </tr>
    671   <tr>
    672    <td>CVE-2017-5970</td>
    673    <td>A-35805460<br>
    674 <a href="//git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b2cef20f19c87999fff3da4071e66937db9644">Upstream
    675 kernel</a></td>
    676    <td>DoS</td>
    677    <td>High</td>
    678    <td>Networking subsystem</td>
    679   </tr>
    680   <tr>
    681    <td>CVE-2015-5707</td>
    682    <td>A-35841297<br>
    683 <a href="//git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81">Upstream kernel</a>
    684 [<a href="//git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee">2</a>]</td>
    685    <td>EoP</td>
    686    <td>Moderate</td>
    687    <td>SCSI driver</td>
    688   </tr>
    689   <tr>
    690    <td>CVE-2017-0710</td>
    691    <td>A-34951864<a href="#asterisk">*</a></td>
    692    <td>EoP</td>
    693    <td>Moderate</td>
    694    <td>TCB</td>
    695   </tr>
    696   <tr>
    697    <td>CVE-2017-7308</td>
    698    <td>A-36725304<br>
    699 <a href="//git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2b6867c2ce76c596676bec7d2d525af525fdc6e2">Upstream kernel</a>
    700 [<a href="//git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8f8d28e4d6d815a391285e121c3a53a0b6cb9e7b">2</a>]
    701 [<a href="//git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bcc5364bdcfe131e6379363f089e7b4108d35b70">3</a>]</td>
    702    <td>EoP</td>
    703    <td>Moderate</td>
    704    <td>Networking driver</td>
    705   </tr>
    706   <tr>
    707    <td>CVE-2014-9731</td>
    708    <td>A-35841292<br>
    709 <a href="//git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14">Upstream
    710 kernel</a></td>
    711    <td>ID</td>
    712    <td>Moderate</td>
    713    <td>File system</td>
    714   </tr>
    715 </table>
    716 <h3 id="mediatek-components">MediaTek components</h3>
    717 <p>The most severe vulnerability in this section could enable a local malicious
    718 application to execute arbitrary code within the context of a privileged
    719 process.</p>
    720 
    721 <table>
    722   <col width="17%">
    723   <col width="19%">
    724   <col width="9%">
    725   <col width="14%">
    726   <col width="39%">
    727   <tr>
    728    <th>CVE</th>
    729    <th>References</th>
    730    <th>Type</th>
    731    <th>Severity</th>
    732    <th>Component</th>
    733   </tr>
    734   <tr>
    735    <td> CVE-2017-0711</td>
    736    <td>A-36099953<a href="#asterisk">*</a><br>
    737        M-ALPS03206781</td>
    738    <td>EoP</td>
    739    <td>High</td>
    740    <td>Networking driver</td>
    741   </tr>
    742 </table>
    743 <h3 id="nvidia-components">NVIDIA components</h3>
    744 <p>The most severe vulnerability in this section could enable a local malicious
    745 application to execute arbitrary code within the context of a privileged
    746 process.</p>
    747 
    748 <table>
    749   <col width="17%">
    750   <col width="19%">
    751   <col width="9%">
    752   <col width="14%">
    753   <col width="39%">
    754   <tr>
    755    <th>CVE</th>
    756    <th>References</th>
    757    <th>Type</th>
    758    <th>Severity</th>
    759    <th>Component</th>
    760   </tr>
    761   <tr>
    762    <td>CVE-2017-0340</td>
    763    <td>A-33968204<a href="#asterisk">*</a><br>
    764        N-CVE-2017-0340</td>
    765    <td>EoP</td>
    766    <td>High</td>
    767    <td>Libnvparser</td>
    768   </tr>
    769   <tr>
    770    <td>CVE-2017-0326</td>
    771    <td>A-33718700<a href="#asterisk">*</a><br>
    772        N-CVE-2017-0326</td>
    773    <td>ID</td>
    774    <td>Moderate</td>
    775    <td>Video driver</td>
    776   </tr>
    777 </table>
    778 <h3 id="qualcomm-components">Qualcomm components</h3>
    779 <p>The most severe vulnerability in this section could enable a local malicious
    780 application to execute arbitrary code within the context of the kernel.</p>
    781 
    782 <table>
    783   <col width="17%">
    784   <col width="19%">
    785   <col width="9%">
    786   <col width="14%">
    787   <col width="39%">
    788   <tr>
    789    <th>CVE</th>
    790    <th>References</th>
    791    <th>Type</th>
    792    <th>Severity</th>
    793    <th>Component</th>
    794   </tr>
    795   <tr>
    796    <td>CVE-2017-8255</td>
    797    <td>A-36251983<br>
    798 <a href="//source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=cd42366a73b38c8867b66472f07d67a6eccde599">QC-CR#985205</a></td>
    799    <td>EoP</td>
    800    <td>High</td>
    801    <td>Bootloader</td>
    802   </tr>
    803   <tr>
    804    <td>CVE-2016-10389</td>
    805    <td>A-34500449<br>
    806 <a href="//source.codeaurora.org/quic/la//kernel/lk/commit/?id=031c27b4b8414bc93a14e773503d9bfc0fc890d2">QC-CR#1009145</a></td>
    807    <td>EoP</td>
    808    <td>High</td>
    809    <td>Bootloader</td>
    810   </tr>
    811   <tr>
    812    <td>CVE-2017-8253</td>
    813    <td>A-35400552<br>
    814 <a href="//www.codeaurora.org/gitweb/quic/la/?p=kernel/msm-4.4.git;a=commit;h=a5f07894058c4198f61e533d727b343c5be879b0">QC-CR#1086764</a></td>
    815    <td>EoP</td>
    816    <td>High</td>
    817    <td>Camera driver</td>
    818   </tr>
    819   <tr>
    820    <td>CVE-2017-8262</td>
    821    <td>A-32938443<br>
    822 <a href="//source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=9ef4ee8e3dfaf4e796bda781826851deebbd89bd">QC-CR#2029113</a></td>
    823    <td>EoP</td>
    824    <td>High</td>
    825    <td>GPU driver</td>
    826   </tr>
    827   <tr>
    828    <td>CVE-2017-8263</td>
    829    <td>A-34126808<a href="#asterisk">*</a><br>
    830        QC-CR#1107034</td>
    831    <td>EoP</td>
    832    <td>High</td>
    833    <td>Anonymous shared memory subsystem</td>
    834   </tr>
    835   <tr>
    836    <td>CVE-2017-8267</td>
    837    <td>A-34173755<a href="#asterisk">*</a><br>
    838        QC-CR#2001129</td>
    839    <td>EoP</td>
    840    <td>High</td>
    841    <td>Anonymous shared memory subsystem</td>
    842   </tr>
    843   <tr>
    844    <td>CVE-2017-8273</td>
    845    <td>A-35400056<br>
    846 <a href="//source.codeaurora.org/quic/la//kernel/lk/commit/?id=dfe6691ba301c769179cabab12d74d4e952462b9">QC-CR#1094372</a>
    847 [<a
    848 href="//source.codeaurora.org/quic/la//kernel/lk/commit/?id=30d94c33dec0ffedc875d7853635a9773921320a">2</a>]</td>
    849    <td>EoP</td>
    850    <td>High</td>
    851    <td>Bootloader</td>
    852   </tr>
    853   <tr>
    854    <td>CVE-2016-5863</td>
    855    <td>A-36251182<br>
    856 <a href="//source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=daf0acd54a6a80de227baef9a06285e4aa5f8c93">QC-CR#1102936</a></td>
    857    <td>EoP</td>
    858    <td>Moderate</td>
    859    <td>USB HID driver</td>
    860   </tr>
    861   <tr>
    862    <td>CVE-2017-8243</td>
    863    <td>A-34112490<a href="#asterisk">*</a><br>
    864        QC-CR#2001803</td>
    865    <td>EoP</td>
    866    <td>Moderate</td>
    867    <td>SoC driver</td>
    868   </tr>
    869   <tr>
    870    <td>CVE-2017-8246</td>
    871    <td>A-37275839<br>
    872 <a href="//source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=30baaec8afb05abf9f794c631ad944838d498ab8">QC-CR#2008031</a></td>
    873    <td>EoP</td>
    874    <td>Moderate</td>
    875    <td>Sound driver</td>
    876   </tr>
    877   <tr>
    878    <td>CVE-2017-8256</td>
    879    <td>A-37286701<br>
    880 <a href="//source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=75e1e00d6b3cd4cb89fd5314a60c333aa0b03230">QC-CR#1104565</a></td>
    881    <td>EoP</td>
    882    <td>Moderate</td>
    883    <td>Wi-Fi driver</td>
    884   </tr>
    885   <tr>
    886    <td>CVE-2017-8257</td>
    887    <td>A-37282763<br>
    888 <a href="//source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=0f19fbd00c6679bbc524f7a6d0fc3d54cfd1c9ae">QC-CR#2003129</a></td>
    889    <td>EoP</td>
    890    <td>Moderate</td>
    891    <td>Video driver</td>
    892   </tr>
    893   <tr>
    894    <td>CVE-2017-8259</td>
    895    <td>A-34359487<br>
    896 <a href="//source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=68020103af00280393da10039b968c95d68e526c">QC-CR#2009016</a></td>
    897    <td>EoP</td>
    898    <td>Moderate</td>
    899    <td>SoC driver</td>
    900   </tr>
    901   <tr>
    902    <td>CVE-2017-8260</td>
    903    <td>A-34624155<br>
    904 <a href="//source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=8f236391e5187c05f7f4b937856944be0af7aaa5">QC-CR#2008469</a></td>
    905    <td>EoP</td>
    906    <td>Moderate</td>
    907    <td>Camera driver</td>
    908   </tr>
    909   <tr>
    910    <td>CVE-2017-8261</td>
    911    <td>A-35139833<a href="#asterisk">*</a><br>
    912        QC-CR#2013631</td>
    913    <td>EoP</td>
    914    <td>Moderate</td>
    915    <td>Camera driver</td>
    916   </tr>
    917   <tr>
    918    <td>CVE-2017-8264</td>
    919    <td>A-33299365<a href="#asterisk">*</a><br>
    920        QC-CR#1107702</td>
    921    <td>EoP</td>
    922    <td>Moderate</td>
    923    <td>Camera driver</td>
    924   </tr>
    925   <tr>
    926    <td>CVE-2017-8265</td>
    927    <td>A-32341313<br>
    928 <a href="//source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=193813a21453ccc7fb6b04bedf881a6feaaa015f">QC-CR#1109755</a></td>
    929    <td>EoP</td>
    930    <td>Moderate</td>
    931    <td>Video driver</td>
    932   </tr>
    933   <tr>
    934    <td>CVE-2017-8266</td>
    935    <td>A-33863407<br>
    936 <a href="//source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=42627c94cf8c189332a6f5bfdd465ea662777911">QC-CR#1110924</a></td>
    937    <td>EoP</td>
    938    <td>Moderate</td>
    939    <td>Video driver</td>
    940   </tr>
    941   <tr>
    942    <td>CVE-2017-8268</td>
    943    <td>A-34620535<a href="#asterisk">*</a><br>
    944        QC-CR#2002207</td>
    945    <td>EoP</td>
    946    <td>Moderate</td>
    947    <td>Camera driver</td>
    948   </tr>
    949   <tr>
    950    <td>CVE-2017-8270</td>
    951    <td>A-35468665<a href="#asterisk">*</a><br>
    952        QC-CR#2021363</td>
    953    <td>EoP</td>
    954    <td>Moderate</td>
    955    <td>Wi-Fi driver</td>
    956   </tr>
    957   <tr>
    958    <td>CVE-2017-8271</td>
    959    <td>A-35950388<a href="#asterisk">*</a><br>
    960        QC-CR#2028681</td>
    961    <td>EoP</td>
    962    <td>Moderate</td>
    963    <td>Video driver</td>
    964   </tr>
    965   <tr>
    966    <td>CVE-2017-8272</td>
    967    <td>A-35950805<a href="#asterisk">*</a><br>
    968        QC-CR#2028702</td>
    969    <td>EoP</td>
    970    <td>Moderate</td>
    971    <td>Video driver</td>
    972   </tr>
    973   <tr>
    974    <td>CVE-2017-8254</td>
    975    <td>A-36252027<br>
    976 <a href="//source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=70afce1d9be745005c48fd565c01ce452a565e7e">QC-CR#832914</a></td>
    977    <td>ID</td>
    978    <td>Moderate</td>
    979    <td>Sound driver</td>
    980   </tr>
    981   <tr>
    982    <td>CVE-2017-8258</td>
    983    <td>A-37279737<br>
    984 <a href="//source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=31e2a2f0f2f3615cefd4400c707709bbc3e26170">QC-CR#2005647</a></td>
    985    <td>ID</td>
    986    <td>Moderate</td>
    987    <td>Camera driver</td>
    988   </tr>
    989   <tr>
    990    <td>CVE-2017-8269</td>
    991    <td>A-33967002<a href="#asterisk">*</a><br>
    992        QC-CR#2013145</td>
    993    <td>ID</td>
    994    <td>Moderate</td>
    995    <td>IPA Driver</td>
    996   </tr>
    997 </table>
    998 <h3 id="qualcomm-closed-source-components">Qualcomm closed-source
    999 components</h3>
   1000 <p>These vulnerabilities affect Qualcomm components and are described in further
   1001 detail in Qualcomm AMSS security bulletins in 2014-2016. They are included in
   1002 this Android security bulletin in order to associate their fixes with an Android
   1003 security patch level. Fixes for these vulnerabilities are available directly
   1004 from Qualcomm.</p>
   1005 
   1006 <table>
   1007   <col width="17%">
   1008   <col width="19%">
   1009   <col width="9%">
   1010   <col width="14%">
   1011   <col width="39%">
   1012   <tr>
   1013    <th>CVE</th>
   1014    <th>References</th>
   1015    <th>Type</th>
   1016    <th>Severity</th>
   1017    <th>Component</th>
   1018   </tr>
   1019   <tr>
   1020    <td>CVE-2014-9411</td>
   1021    <td>A-37473054<a href="#asterisk">*</a><br>
   1022        QC-CR#532956</td>
   1023    <td>N/A</td>
   1024    <td>High</td>
   1025    <td>Secure systems group</td>
   1026   </tr>
   1027   <tr>
   1028    <td>CVE-2014-9968</td>
   1029    <td>A-37304413<a href="#asterisk">*</a><br>
   1030        QC-CR#642084</td>
   1031    <td>N/A</td>
   1032    <td>High</td>
   1033    <td>Modem</td>
   1034   </tr>
   1035   <tr>
   1036    <td>CVE-2014-9973</td>
   1037    <td>A-37470982<a href="#asterisk">*</a><br>
   1038        QC-CR#646919</td>
   1039    <td>N/A</td>
   1040    <td>High</td>
   1041    <td>Secure systems group</td>
   1042   </tr>
   1043   <tr>
   1044    <td>CVE-2014-9974</td>
   1045    <td>A-37471979<a href="#asterisk">*</a><br>
   1046        QC-CR#654072</td>
   1047    <td>N/A</td>
   1048    <td>High</td>
   1049    <td>Secure systems group</td>
   1050   </tr>
   1051   <tr>
   1052    <td>CVE-2014-9975</td>
   1053    <td>A-37471230<a href="#asterisk">*</a><br>
   1054        QC-CR#700125</td>
   1055    <td>N/A</td>
   1056    <td>High</td>
   1057    <td>Secure systems group</td>
   1058   </tr>
   1059   <tr>
   1060    <td>CVE-2014-9977</td>
   1061    <td>A-37471087<a href="#asterisk">*</a><br>
   1062        QC-CR#703002</td>
   1063    <td>N/A</td>
   1064    <td>High</td>
   1065    <td>Secure systems group</td>
   1066   </tr>
   1067   <tr>
   1068    <td>CVE-2014-9978</td>
   1069    <td>A-37468982<a href="#asterisk">*</a><br>
   1070        QC-CR#709939</td>
   1071    <td>N/A</td>
   1072    <td>High</td>
   1073    <td>Secure systems group</td>
   1074   </tr>
   1075   <tr>
   1076    <td>CVE-2014-9979</td>
   1077    <td>A-37471088<a href="#asterisk">*</a><br>
   1078        QC-CR#717304</td>
   1079    <td>N/A</td>
   1080    <td>High</td>
   1081    <td>Secure systems group</td>
   1082   </tr>
   1083   <tr>
   1084    <td>CVE-2014-9980</td>
   1085    <td>A-37471029<a href="#asterisk">*</a><br>
   1086        QC-CR#709766</td>
   1087    <td>N/A</td>
   1088    <td>High</td>
   1089    <td>Secure systems group</td>
   1090   </tr>
   1091   <tr>
   1092    <td>CVE-2015-0575</td>
   1093    <td>A-37296999<a href="#asterisk">*</a><br>
   1094        QC-CR#715815</td>
   1095    <td>N/A</td>
   1096    <td>High</td>
   1097    <td>Modem</td>
   1098   </tr>
   1099   <tr>
   1100    <td>CVE-2015-8592</td>
   1101    <td>A-37470090<a href="#asterisk">*</a><br>
   1102        QC-CR#775396</td>
   1103    <td>N/A</td>
   1104    <td>High</td>
   1105    <td>Core</td>
   1106   </tr>
   1107   <tr>
   1108    <td>CVE-2015-8595</td>
   1109    <td>A-37472411<a href="#asterisk">*</a><br>
   1110        QC-CR#790151</td>
   1111    <td>N/A</td>
   1112    <td>High</td>
   1113    <td>Secure systems group</td>
   1114   </tr>
   1115   <tr>
   1116    <td>CVE-2015-8596</td>
   1117    <td>A-37472806<a href="#asterisk">*</a><br>
   1118        QC-CR#802005</td>
   1119    <td>N/A</td>
   1120    <td>High</td>
   1121    <td>Secure systems group</td>
   1122   </tr>
   1123   <tr>
   1124    <td>CVE-2015-9034</td>
   1125    <td>A-37305706<a href="#asterisk">*</a><br>
   1126        QC-CR#614512</td>
   1127    <td>N/A</td>
   1128    <td>High</td>
   1129    <td>Modem</td>
   1130   </tr>
   1131   <tr>
   1132    <td>CVE-2015-9035</td>
   1133    <td>A-37303626<a href="#asterisk">*</a><br>
   1134        QC-CR#750231</td>
   1135    <td>N/A</td>
   1136    <td>High</td>
   1137    <td>Modem</td>
   1138   </tr>
   1139   <tr>
   1140    <td>CVE-2015-9036</td>
   1141    <td>A-37303519<a href="#asterisk">*</a><br>
   1142        QC-CR#751831</td>
   1143    <td>N/A</td>
   1144    <td>High</td>
   1145    <td>Modem</td>
   1146   </tr>
   1147   <tr>
   1148    <td>CVE-2015-9037</td>
   1149    <td>A-37304366<a href="#asterisk">*</a><br>
   1150        QC-CR#753315</td>
   1151    <td>N/A</td>
   1152    <td>High</td>
   1153    <td>Modem</td>
   1154   </tr>
   1155   <tr>
   1156    <td>CVE-2015-9038</td>
   1157    <td>A-37303027<a href="#asterisk">*</a><br>
   1158        QC-CR#758328</td>
   1159    <td>N/A</td>
   1160    <td>High</td>
   1161    <td>Modem</td>
   1162   </tr>
   1163   <tr>
   1164    <td>CVE-2015-9039</td>
   1165    <td>A-37302628<a href="#asterisk">*</a><br>
   1166        QC-CR#760282</td>
   1167    <td>N/A</td>
   1168    <td>High</td>
   1169    <td>Modem</td>
   1170   </tr>
   1171   <tr>
   1172    <td>CVE-2015-9040</td>
   1173    <td>A-37303625<a href="#asterisk">*</a><br>
   1174        QC-CR#761216</td>
   1175    <td>N/A</td>
   1176    <td>High</td>
   1177    <td>Modem</td>
   1178   </tr>
   1179   <tr>
   1180    <td>CVE-2015-9041</td>
   1181    <td>A-37303518<a href="#asterisk">*</a><br>
   1182        QC-CR#762126</td>
   1183    <td>N/A</td>
   1184    <td>High</td>
   1185    <td>Modem</td>
   1186   </tr>
   1187   <tr>
   1188    <td>CVE-2015-9042</td>
   1189    <td>A-37301248<a href="#asterisk">*</a><br>
   1190        QC-CR#762214</td>
   1191    <td>N/A</td>
   1192    <td>High</td>
   1193    <td>Modem</td>
   1194   </tr>
   1195   <tr>
   1196    <td>CVE-2015-9043</td>
   1197    <td>A-37305954<a href="#asterisk">*</a><br>
   1198        QC-CR#762954</td>
   1199    <td>N/A</td>
   1200    <td>High</td>
   1201    <td>Modem</td>
   1202   </tr>
   1203   <tr>
   1204    <td>CVE-2015-9044</td>
   1205    <td>A-37303520<a href="#asterisk">*</a><br>
   1206        QC-CR#764858</td>
   1207    <td>N/A</td>
   1208    <td>High</td>
   1209    <td>Modem</td>
   1210   </tr>
   1211   <tr>
   1212    <td>CVE-2015-9045</td>
   1213    <td>A-37302136<a href="#asterisk">*</a><br>
   1214        QC-CR#766189</td>
   1215    <td>N/A</td>
   1216    <td>High</td>
   1217    <td>Modem</td>
   1218   </tr>
   1219   <tr>
   1220    <td>CVE-2015-9046</td>
   1221    <td>A-37301486<a href="#asterisk">*</a><br>
   1222        QC-CR#767335</td>
   1223    <td>N/A</td>
   1224    <td>High</td>
   1225    <td>Modem</td>
   1226   </tr>
   1227   <tr>
   1228    <td>CVE-2015-9047</td>
   1229    <td>A-37304367<a href="#asterisk">*</a><br>
   1230        QC-CR#779285</td>
   1231    <td>N/A</td>
   1232    <td>High</td>
   1233    <td>Modem</td>
   1234   </tr>
   1235   <tr>
   1236    <td>CVE-2015-9048</td>
   1237    <td>A-37305707<a href="#asterisk">*</a><br>
   1238        QC-CR#795960</td>
   1239    <td>N/A</td>
   1240    <td>High</td>
   1241    <td>Modem</td>
   1242   </tr>
   1243   <tr>
   1244    <td>CVE-2015-9049</td>
   1245    <td>A-37301488<a href="#asterisk">*</a><br>
   1246        QC-CR#421589, QC-CR#817165</td>
   1247    <td>N/A</td>
   1248    <td>High</td>
   1249    <td>Modem</td>
   1250   </tr>
   1251   <tr>
   1252    <td>CVE-2015-9050</td>
   1253    <td>A-37302137<a href="#asterisk">*</a><br>
   1254        QC-CR#830102</td>
   1255    <td>N/A</td>
   1256    <td>High</td>
   1257    <td>Modem</td>
   1258   </tr>
   1259   <tr>
   1260    <td>CVE-2015-9051</td>
   1261    <td>A-37300737<a href="#asterisk">*</a><br>
   1262        QC-CR#837317</td>
   1263    <td>N/A</td>
   1264    <td>High</td>
   1265    <td>Modem</td>
   1266   </tr>
   1267   <tr>
   1268    <td>CVE-2015-9052</td>
   1269    <td>A-37304217<a href="#asterisk">*</a><br>
   1270        QC-CR#840483</td>
   1271    <td>N/A</td>
   1272    <td>High</td>
   1273    <td>Modem</td>
   1274   </tr>
   1275   <tr>
   1276    <td>CVE-2015-9053</td>
   1277    <td>A-37301249<a href="#asterisk">*</a><br>
   1278        QC-CR#843808</td>
   1279    <td>N/A</td>
   1280    <td>High</td>
   1281    <td>Modem</td>
   1282   </tr>
   1283   <tr>
   1284    <td>CVE-2015-9054</td>
   1285    <td>A-37303177<a href="#asterisk">*</a><br>
   1286        QC-CR#856077</td>
   1287    <td>N/A</td>
   1288    <td>High</td>
   1289    <td>Modem</td>
   1290   </tr>
   1291   <tr>
   1292    <td>CVE-2015-9055</td>
   1293    <td>A-37472412<a href="#asterisk">*</a><br>
   1294        QC-CR#806464</td>
   1295    <td>N/A</td>
   1296    <td>High</td>
   1297    <td>Core</td>
   1298   </tr>
   1299   <tr>
   1300    <td>CVE-2015-9060</td>
   1301    <td>A-37472807<a href="#asterisk">*</a><br>
   1302        QC-CR#817343</td>
   1303    <td>N/A</td>
   1304    <td>High</td>
   1305    <td>Secure systems group</td>
   1306   </tr>
   1307   <tr>
   1308    <td>CVE-2015-9061</td>
   1309    <td>A-37470436<a href="#asterisk">*</a><br>
   1310        QC-CR#824195</td>
   1311    <td>N/A</td>
   1312    <td>High</td>
   1313    <td>Secure systems group</td>
   1314   </tr>
   1315   <tr>
   1316    <td>CVE-2015-9062</td>
   1317    <td>A-37472808<a href="#asterisk">*</a><br>
   1318        QC-CR#802039</td>
   1319    <td>N/A</td>
   1320    <td>High</td>
   1321    <td>Secure systems group</td>
   1322   </tr>
   1323   <tr>
   1324    <td>CVE-2015-9067</td>
   1325    <td>A-37474000<a href="#asterisk">*</a><br>
   1326        QC-CR#848926</td>
   1327    <td>N/A</td>
   1328    <td>High</td>
   1329    <td>Secure systems group</td>
   1330   </tr>
   1331   <tr>
   1332    <td>CVE-2015-9068</td>
   1333    <td>A-37470144<a href="#asterisk">*</a><br>
   1334        QC-CR#851114</td>
   1335    <td>N/A</td>
   1336    <td>High</td>
   1337    <td>Secure systems group</td>
   1338   </tr>
   1339   <tr>
   1340    <td>CVE-2015-9069</td>
   1341    <td>A-37470777<a href="#asterisk">*</a><br>
   1342        QC-CR#854496</td>
   1343    <td>N/A</td>
   1344    <td>High</td>
   1345    <td>Secure systems group</td>
   1346   </tr>
   1347   <tr>
   1348    <td>CVE-2015-9070</td>
   1349    <td>A-37474001<a href="#asterisk">*</a><br>
   1350        QC-CR#877102</td>
   1351    <td>N/A</td>
   1352    <td>High</td>
   1353    <td>Secure systems group</td>
   1354   </tr>
   1355   <tr>
   1356    <td>CVE-2015-9071</td>
   1357    <td>A-37471819<a href="#asterisk">*</a><br>
   1358        QC-CR#877276</td>
   1359    <td>N/A</td>
   1360    <td>High</td>
   1361    <td>Secure systems group</td>
   1362   </tr>
   1363   <tr>
   1364    <td>CVE-2015-9072</td>
   1365    <td>A-37474002<a href="#asterisk">*</a><br>
   1366        QC-CR#877361</td>
   1367    <td>N/A</td>
   1368    <td>High</td>
   1369    <td>Secure systems group</td>
   1370   </tr>
   1371   <tr>
   1372    <td>CVE-2015-9073</td>
   1373    <td>A-37473407<a href="#asterisk">*</a><br>
   1374        QC-CR#878073</td>
   1375    <td>N/A</td>
   1376    <td>High</td>
   1377    <td>Secure systems group</td>
   1378   </tr>
   1379   <tr>
   1380    <td>CVE-2016-10343</td>
   1381    <td>A-32580186<a href="#asterisk">*</a><br>
   1382        QC-CR#972213</td>
   1383    <td>N/A</td>
   1384    <td>High</td>
   1385    <td>Modem</td>
   1386   </tr>
   1387   <tr>
   1388    <td>CVE-2016-10344</td>
   1389    <td>A-32583954<a href="#asterisk">*</a><br>
   1390        QC-CR#1022360</td>
   1391    <td>N/A</td>
   1392    <td>High</td>
   1393    <td>Modem</td>
   1394   </tr>
   1395   <tr>
   1396    <td>CVE-2016-10346</td>
   1397    <td>A-37473408<a href="#asterisk">*</a><br>
   1398        QC-CR#896584</td>
   1399    <td>N/A</td>
   1400    <td>High</td>
   1401    <td>Core</td>
   1402   </tr>
   1403   <tr>
   1404    <td>CVE-2016-10347</td>
   1405    <td>A-37471089<a href="#asterisk">*</a><br>
   1406        QC-CR#899671</td>
   1407    <td>N/A</td>
   1408    <td>High</td>
   1409    <td>Core</td>
   1410   </tr>
   1411   <tr>
   1412    <td>CVE-2016-10382</td>
   1413    <td>A-28823584<a href="#asterisk">*</a><br>
   1414        QC-CR#944014</td>
   1415    <td>N/A</td>
   1416    <td>High</td>
   1417    <td>Secure systems group</td>
   1418   </tr>
   1419   <tr>
   1420    <td>CVE-2016-10383</td>
   1421    <td>A-28822389<a href="#asterisk">*</a><br>
   1422        QC-CR#960624</td>
   1423    <td>N/A</td>
   1424    <td>High</td>
   1425    <td>Secure systems group</td>
   1426   </tr>
   1427   <tr>
   1428    <td>CVE-2016-10388</td>
   1429    <td>A-32580294<a href="#asterisk">*</a><br>
   1430        QC-CR#992749</td>
   1431    <td>N/A</td>
   1432    <td>High</td>
   1433    <td>Secure systems group</td>
   1434   </tr>
   1435   <tr>
   1436    <td>CVE-2016-10391</td>
   1437    <td>A-32583804<a href="#asterisk">*</a><br>
   1438        QC-CR#970283</td>
   1439    <td>N/A</td>
   1440    <td>High</td>
   1441    <td>WConnect</td>
   1442   </tr>
   1443   <tr>
   1444    <td>CVE-2016-5871</td>
   1445    <td>A-37473055<a href="#asterisk">*</a><br>
   1446        QC-CR#883013</td>
   1447    <td>N/A</td>
   1448    <td>High</td>
   1449    <td>Secure systems group</td>
   1450   </tr>
   1451   <tr>
   1452    <td>CVE-2016-5872</td>
   1453    <td>A-37472809<a href="#asterisk">*</a><br>
   1454        QC-CR#886220</td>
   1455    <td>N/A</td>
   1456    <td>High</td>
   1457    <td>Secure systems group</td>
   1458   </tr>
   1459 </table>
   1460 <h2 id="google-device-updates">Google device updates</h2>
   1461 <p>This table contains the security patch level in the latest over-the-air update
   1462 (OTA) and firmware images for Google devices. The Google device firmware images
   1463 are available on the <a
   1464 href="//developers.google.com/android/nexus/images">Google Developer
   1465 site</a>.</p>
   1466 
   1467 <table>
   1468   <col width="25%">
   1469   <col width="75%">
   1470   <tr>
   1471    <th>Google device</th>
   1472    <th>Security patch level</th>
   1473   </tr>
   1474   <tr>
   1475    <td>Pixel / Pixel XL</td>
   1476    <td>July 05, 2017</td>
   1477   </tr>
   1478   <tr>
   1479    <td>Nexus 5X</td>
   1480    <td>July 05, 2017</td>
   1481   </tr>
   1482   <tr>
   1483    <td>Nexus 6</td>
   1484    <td>July 05, 2017</td>
   1485   </tr>
   1486   <tr>
   1487    <td>Nexus 6P</td>
   1488    <td>July 05, 2017</td>
   1489   </tr>
   1490   <tr>
   1491    <td>Nexus 9</td>
   1492    <td>July 05, 2017</td>
   1493   </tr>
   1494   <tr>
   1495    <td>Nexus Player</td>
   1496    <td>July 05, 2017</td>
   1497   </tr>
   1498   <tr>
   1499    <td>Pixel C</td>
   1500    <td>July 05, 2017</td>
   1501   </tr>
   1502 </table>
   1503 <h2 id="acknowledgements">Acknowledgements</h2>
   1504 <p>We would like to thank these researchers for their contributions:</p>
   1505 
   1506 <table>
   1507   <col width="17%">
   1508   <col width="83%">
   1509   <tr>
   1510    <th>CVEs</th>
   1511    <th>Researchers</th>
   1512   </tr>
   1513   <tr>
   1514    <td>CVE-2017-0711</td>
   1515    <td>Chengming Yang, Baozeng Ding, and Yang Song of Alibaba Mobile Security
   1516 Group</td>
   1517   </tr>
   1518   <tr>
   1519    <td>CVE-2017-0706</td>
   1520    <td>Daxing Guo (<a href="//twitter.com/freener0">@freener0</a>) of
   1521 Xuanwu Lab, Tencent</td>
   1522   </tr>
   1523   <tr>
   1524    <td>CVE-2017-8260</td>
   1525    <td>Derrek (<a href="//twitter.com/derrekr6">@derrekr6</a>) and Scott
   1526 Bauer</td>
   1527   </tr>
   1528   <tr>
   1529    <td>CVE-2017-8265</td>
   1530    <td>Di Shen (<a href="//twitter.com/returnsme?lang=en">@returnsme</a>)
   1531 of KeenLab (<a href="//twitter.com/keen_lab?lang=en">@keen_lab</a>),
   1532 Tencent</td>
   1533   </tr>
   1534   <tr>
   1535    <td>CVE-2017-0703</td>
   1536    <td><a href="//fb.me/dzimka">Dzmitry Lukyanenka</a></td>
   1537   </tr>
   1538   <tr>
   1539    <td>CVE-2017-0692, CVE-2017-0694</td>
   1540    <td>Elphet and Gong Guang of Alpha Team, Qihoo 360 Technology Co. Ltd.</td>
   1541   </tr>
   1542   <tr>
   1543    <td>CVE-2017-8266, CVE-2017-8243, CVE-2017-8270</td>
   1544    <td>Gengjia Chen (<a
   1545 href="//twitter.com/chengjia4574">@chengjia4574</a>) and <a
   1546 href="//weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360 Technology Co.
   1547 Ltd.</td>
   1548   </tr>
   1549   <tr>
   1550    <td>CVE-2017-0665, CVE-2017-0681</td>
   1551    <td><a href="mailto:arnow117 (a] gmail.com">Hanxiang Wen</a>, Mingjian Zhou (<a
   1552 href="//twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>), and Xuxian Jiang
   1553 of <a href="//c0reteam.org">C0RE Team</a></td>
   1554   </tr>
   1555   <tr>
   1556    <td>CVE-2017-8268, CVE-2017-8261</td>
   1557    <td>Jianqiang Zhao (<a
   1558 href="//twitter.com/jianqiangzhao">@jianqiangzhao</a>) and <a
   1559 href="//weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360</td>
   1560   </tr>
   1561   <tr>
   1562    <td>CVE-2017-0698</td>
   1563    <td>Joey Brand of Census Consulting Inc.</td>
   1564   </tr>
   1565   <tr>
   1566    <td>CVE-2017-0666, CVE-2017-0684</td>
   1567    <td>Mingjian Zhou (<a
   1568 href="//twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>), <a
   1569 href="mailto:zc1991 (a] mail.ustc.edu.cn">Chi Zhang</a>, and Xuxian Jiang of <a
   1570 href="//c0reteam.org">C0RE Team</a></td>
   1571   </tr>
   1572   <tr>
   1573    <td>CVE-2017-0697, CVE-2017-0670</td>
   1574    <td><a href="mailto:jiych.guru (a] gmail.com">Niky1235</a> (<a
   1575 href="//twitter.com/jiych_guru">@jiych_guru</a>)</td>
   1576   </tr>
   1577   <tr>
   1578    <td>CVE-2017-9417</td>
   1579    <td>Nitay Artenstein of Exodus Intelligence</td>
   1580   </tr>
   1581   <tr>
   1582    <td>CVE-2017-0705, CVE-2017-8259</td>
   1583    <td><a href="//twitter.com/ScottyBauer1">Scott Bauer</a></td>
   1584   </tr>
   1585   <tr>
   1586    <td>CVE-2017-0667</td>
   1587    <td>Timothy Becker of CSS Inc.</td>
   1588   </tr>
   1589   <tr>
   1590    <td>CVE-2017-0682, CVE-2017-0683, CVE-2017-0676,
   1591 CVE-2017-0696, CVE-2017-0675, CVE-2017-0701, CVE-2017-0702, CVE-2017-0699</td>
   1592    <td>Vasily Vasiliev</td>
   1593   </tr>
   1594   <tr>
   1595    <td>CVE-2017-0695, CVE-2017-0689, CVE-2017-0540, CVE-2017-0680,
   1596 CVE-2017-0679, CVE-2017-0685, CVE-2017-0686, CVE-2017-0693, CVE-2017-0674,
   1597 CVE-2017-0677</td>
   1598    <td>V.E.O (<a href="//twitter.com/vysea">@VYSEa</a>) of <a
   1599 href="//blog.trendmicro.com/trendlabs-security-intelligence/category/mobile/">Mobile
   1600 Threat Response Team</a>, <a href="//www.trendmicro.com">Trend Micro</a></td>
   1601   </tr>
   1602   <tr>
   1603    <td>CVE-2017-0708</td>
   1604    <td>Xiling Gong of Tencent Security Platform Department</td>
   1605   </tr>
   1606   <tr>
   1607    <td>CVE-2017-0690</td>
   1608    <td>Yangkang (<a href="//twitter.com/dnpushme">@dnpushme</a>) and
   1609 Liyadong of Qihoo 360 Qex Team</td>
   1610   </tr>
   1611   <tr>
   1612    <td>CVE-2017-8269, CVE-2017-8271, CVE-2017-8272, CVE-2017-8267</td>
   1613    <td>Yonggang Guo (<a href="//twitter.com/guoygang">@guoygang</a>) of
   1614 IceSword Lab, Qihoo 360 Technology Co. Ltd.</td>
   1615   </tr>
   1616   <tr>
   1617    <td>CVE-2017-8264, CVE-2017-0326, CVE-2017-0709</td>
   1618    <td>Yuan-Tsung Lo (<a
   1619 href="mailto:computernik (a] gmail.com">computernik (a] gmail.com</a>) and Xuxian Jiang
   1620 of <a href="//c0reteam.org">C0RE Team</a></td>
   1621   </tr>
   1622   <tr>
   1623    <td>CVE-2017-0704, CVE-2017-0669</td>
   1624    <td>Yuxiang Li (<a href="//twitter.com/xbalien29">@Xbalien29</a>) of
   1625 Tencent Security Platform Department</td>
   1626   </tr>
   1627   <tr>
   1628    <td>CVE-2017-0678</td>
   1629    <td><a href="//weibo.com/ele7enxxh">Zinuo Han</a> of Chengdu Security
   1630 Response Center, Qihoo 360 Technology Co. Ltd.</td>
   1631   </tr>
   1632   <tr>
   1633    <td>CVE-2017-0691, CVE-2017-0700</td>
   1634    <td><a href="//weibo.com/ele7enxxh">Zinuo Han</a> of Chengdu Security
   1635 Response Center, Qihoo 360 Technology Co. Ltd. and Ao Wang (<a
   1636 href="//twitter.com/ArayzSegment">@ArayzSegment</a>) of <a
   1637 href="//www.pwnzen.com/">Pangu Team</a></td>
   1638   </tr>
   1639 </table>
   1640 <h2 id="common-questions-and-answers">Common questions and answers</h2>
   1641 <p>This section answers common questions that may occur after reading this
   1642 bulletin.</p>
   1643 
   1644 <p><strong>1. How do I determine if my device is updated to address these issues?
   1645 </strong></p>
   1646 
   1647 <p>To learn how to check a device's security patch level, read the instructions on
   1648 the <a href="//support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
   1649 and Nexus update schedule</a>.</p>
   1650 <ul>
   1651   <li>Security patch levels of 2017-07-01 or later address all issues associated
   1652   with the 2017-07-01 security patch level.</li>
   1653   <li>Security patch levels of 2017-07-05 or later address all issues associated
   1654   with the 2017-07-05 security patch level and all previous patch levels.</li>
   1655 </ul>
   1656 <p>Device manufacturers that include these updates should set the patch string
   1657 level to:</p>
   1658 <ul>
   1659   <li>[ro.build.version.security_patch]:[2017-07-01]</li>
   1660   <li>[ro.build.version.security_patch]:[2017-07-05]</li>
   1661 </ul>
   1662 <p><strong>2. Why does this bulletin have two security patch levels?</strong></p>
   1663 
   1664 <p>This bulletin has two security patch levels so that Android partners have the
   1665 flexibility to fix a subset of vulnerabilities that are similar across all
   1666 Android devices more quickly. Android partners are encouraged to fix all issues
   1667 in this bulletin and use the latest security patch level.</p>
   1668 <ul>
   1669   <li>Devices that use the July 01, 2017 security patch level must include all
   1670   issues associated with that security patch level, as well as fixes for all
   1671   issues reported in previous security bulletins.</li>
   1672   <li>Devices that use the security patch level of July 05, 2017 or newer must
   1673   include all applicable patches in this (and previous) security
   1674   bulletins.</li>
   1675 </ul>
   1676 <p>Partners are encouraged to bundle the fixes for all issues they are addressing
   1677 in a single update.</p>
   1678 
   1679 <p><strong>3. What do the entries in the <em>Type</em> column mean?</strong></p>
   1680 
   1681 <p>Entries in the <em>Type</em> column of the vulnerability details table reference
   1682 the classification of the security vulnerability.</p>
   1683 
   1684 <table>
   1685   <col width="25%">
   1686   <col width="75%">
   1687   <tr>
   1688    <th>Abbreviation</th>
   1689    <th>Definition</th>
   1690   </tr>
   1691   <tr>
   1692    <td>RCE</td>
   1693    <td>Remote code execution</td>
   1694   </tr>
   1695   <tr>
   1696    <td>EoP</td>
   1697    <td>Elevation of privilege</td>
   1698   </tr>
   1699   <tr>
   1700    <td>ID</td>
   1701    <td>Information disclosure</td>
   1702   </tr>
   1703   <tr>
   1704    <td>DoS</td>
   1705    <td>Denial of service</td>
   1706   </tr>
   1707   <tr>
   1708    <td>N/A</td>
   1709    <td>Classification not available</td>
   1710   </tr>
   1711 </table>
   1712 
   1713 <p><strong>4. What do the entries in the <em>References</em> column mean?</strong></p>
   1714 
   1715 <p>Entries under the <em>References</em> column of the vulnerability details table
   1716 may contain a prefix identifying the organization to which the reference value
   1717 belongs.</p>
   1718 
   1719 <table>
   1720   <col width="25%">
   1721   <col width="75%">
   1722   <tr>
   1723    <th>Prefix</th>
   1724    <th>Reference</th>
   1725   </tr>
   1726   <tr>
   1727    <td>A-</td>
   1728    <td>Android bug ID</td>
   1729   </tr>
   1730   <tr>
   1731    <td>QC-</td>
   1732    <td>Qualcomm reference number</td>
   1733   </tr>
   1734   <tr>
   1735    <td>M-</td>
   1736    <td>MediaTek reference number</td>
   1737   </tr>
   1738   <tr>
   1739    <td>N-</td>
   1740    <td>NVIDIA reference number</td>
   1741   </tr>
   1742   <tr>
   1743    <td>B-</td>
   1744    <td>Broadcom reference number</td>
   1745   </tr>
   1746 </table>
   1747 
   1748 <p id="asterisk"><strong>5. What does a * next to the Android bug ID in the <em>References</em>
   1749 column mean?</strong></p>
   1750 
   1751 <p>Issues that are not publicly available have a * next to the Android bug ID in
   1752 the <em>References</em> column. The update for that issue is generally contained
   1753 in the latest binary drivers for Nexus devices available from the <a
   1754 href="//developers.google.com/android/nexus/drivers">Google Developer
   1755 site</a>.</p>
   1756 
   1757 <h2 id="versions">Versions</h2>
   1758 <table>
   1759   <col width="25%">
   1760   <col width="25%">
   1761   <col width="50%">
   1762   <tr>
   1763    <th>Version</th>
   1764    <th>Date</th>
   1765    <th>Notes</th>
   1766   </tr>
   1767   <tr>
   1768    <td>1.0</td>
   1769    <td>July 5, 2017</td>
   1770    <td>Bulletin published.</td>
   1771   </tr>
   1772   <tr>
   1773    <td>1.1</td>
   1774    <td>July 6, 2017</td>
   1775    <td>Bulletin revised to include AOSP links.</td>
   1776   </tr>
   1777   <tr>
   1778    <td>1.2</td>
   1779    <td>July 11, 2017</td>
   1780    <td>Bulletin revised to update acknowledgements.</td>
   1781   </tr>
   1782 </table>
   1783 </table>
   1784 </body>
   1785 </html>
   1786