diff options
author | Android Partner Docs <noreply@android.com> | 2018-02-13 12:14:30 -0800 |
---|---|---|
committer | Clay Murphy <claym@google.com> | 2018-02-13 14:27:14 -0800 |
commit | 43777eee371e6f873e7757bbaab25763b7ed1053 (patch) | |
tree | e24b37636ab23996b5b08a0f931425269bde43eb /en | |
parent | 6db7c1d6346142f8c543dbc79cbfb68639266d0b (diff) | |
download | source.android.com-43777eee371e6f873e7757bbaab25763b7ed1053.tar.gz |
Docs: Changes to source.android.com
- 185568049 Typo in the usb adapter spec by Danielle Roberts <daroberts@google.com>
- 185454531 Devsite localized content from translation request f937f9... by Android Partner Docs <noreply@android.com>
- 185454519 Devsite localized content from translation request 379736... by Android Partner Docs <noreply@android.com>
- 185454514 Devsite localized content from translation request 92bc2c... by Android Partner Docs <noreply@android.com>
- 185454118 Devsite localized content from translation request fc1572... by Android Partner Docs <noreply@android.com>
- 185454110 Devsite localized content from translation request 465ee3... by Android Partner Docs <noreply@android.com>
- 185454102 Devsite localized content from translation request ff994d... by Android Partner Docs <noreply@android.com>
- 185441660 Devsite localized content from translation request 2d6e3e... by Android Partner Docs <noreply@android.com>
- 185441584 Devsite localized content from translation request dcfc8e... by Android Partner Docs <noreply@android.com>
- 185197349 Fix typo. by Android Partner Docs <noreply@android.com>
- 185069980 fix typo by Android Partner Docs <noreply@android.com>
- 185020036 Add example about optimizing kernel initcall by Android Partner Docs <noreply@android.com>
- 184942796 Add analog-to-USB-C adapter and USB device spec by Danielle Roberts <daroberts@google.com>
- 184900015 Exclude old bulletins from localization by Danielle Roberts <daroberts@google.com>
- 184880179 Update Feb 2018 bulletins with AOSP links by Danielle Roberts <daroberts@google.com>
PiperOrigin-RevId: 185568049
Change-Id: Id2ddd64fd6d7f29d7d5dee0e900c84b1a69e2a55
Diffstat (limited to 'en')
-rw-r--r-- | en/_index.yaml | 14 | ||||
-rw-r--r-- | en/devices/_toc-interfaces.yaml | 24 | ||||
-rw-r--r-- | en/devices/accessories/headset/usb-adapter.html | 112 | ||||
-rw-r--r-- | en/devices/accessories/headset/usb-device.html | 124 | ||||
-rw-r--r-- | en/devices/accessories/headset/usb-headset-spec.html | 118 | ||||
-rw-r--r-- | en/devices/tech/ota/index.html | 2 | ||||
-rw-r--r-- | en/devices/tech/perf/boot-times.html | 6 | ||||
-rw-r--r-- | en/security/bulletin/2018-02-01.html | 78 | ||||
-rw-r--r-- | en/security/bulletin/_translation.yaml | 33 | ||||
-rw-r--r-- | en/security/bulletin/pixel/2018-02-01.html | 106 | ||||
-rw-r--r-- | en/security/selinux/device-policy.html | 2 |
11 files changed, 432 insertions, 187 deletions
diff --git a/en/_index.yaml b/en/_index.yaml index 3f4fab67..85acc4bc 100644 --- a/en/_index.yaml +++ b/en/_index.yaml @@ -73,6 +73,13 @@ landing_page: image_path: /images/android_stack.png - heading: News items: + - heading: February Security Bulletins + description: > + The February 2018 Android and Pixel/Nexus Security Bulletins have been + published to support the February security release. + buttons: + - label: February 7th, 2018 + path: /security/bulletin/2018-02-01 - heading: ART DEX bytecode improvements description: > Android runtime (ART) now includes bytecode documentation for @@ -81,13 +88,6 @@ landing_page: buttons: - label: January 19th, 2018 path: /devices/tech/dalvik/dalvik-bytecode - - heading: January Security Bulletins - description: > - The January 2018 Android and Pixel/Nexus Security Bulletins have been - published to support the January security release. - buttons: - - label: January 2nd, 2018 - path: /security/bulletin/2018-01-01 - heading: Android 8.1 Instructions description: > The Android 8.1 release is now available and offers many new features diff --git a/en/devices/_toc-interfaces.yaml b/en/devices/_toc-interfaces.yaml index 74313cbe..dba14fbe 100644 --- a/en/devices/_toc-interfaces.yaml +++ b/en/devices/_toc-interfaces.yaml @@ -336,20 +336,24 @@ toc: section: - title: Overview path: /devices/accessories/audio - - title: Headset + - title: 3.5 mm Headset section: - - title: Overview - path: /devices/accessories/headset/ - - title: 3.5 mm Headset Spec + - title: Headset Spec path: /devices/accessories/headset/plug-headset-spec - - title: 3.5 mm Jack Spec + - title: Device Spec path: /devices/accessories/headset/jack-headset-spec - - title: USB Headset Spec + - title: USB Headset + section: + - title: Headset Spec path: /devices/accessories/headset/usb-headset-spec - - title: Expected Behavior - path: /devices/accessories/headset/expected-behavior - - title: Testing - path: /devices/accessories/headset/testing + - title: Adapter Spec + path: /devices/accessories/headset/usb-adapter + - title: Device Spec + path: /devices/accessories/headset/usb-device + - title: Expected Behavior + path: /devices/accessories/headset/expected-behavior + - title: Testing + path: /devices/accessories/headset/testing - title: Custom Accessories section: - title: Overview diff --git a/en/devices/accessories/headset/usb-adapter.html b/en/devices/accessories/headset/usb-adapter.html new file mode 100644 index 00000000..4b70bc1d --- /dev/null +++ b/en/devices/accessories/headset/usb-adapter.html @@ -0,0 +1,112 @@ +<html devsite> + <head> + <title>USB-C-to-Analog Audio Adapter</title> + <meta name="project_path" value="/_project.yaml" /> + <meta name="book_path" value="/_book.yaml" /> + </head> + <body> + <!-- + Copyright 2018 The Android Open Source Project + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. + --> + + + +<p> +While some new Android phones are being produced without a 3.5 mm jack, users +may still own 3.5 mm headsets that they want to use with those devices. To +facilitate that, this article specifies a USB-C-to-analog audio adapter spec to +plug +<a href="/devices/accessories/headset/plug-headset-spec.html">3.5 mm headsets</a> +into devices that only have a +<a href="/devices/accessories/headset/usb-device">USB-C port</a>.</p> +<p> +This documentation specifies the minimum requirements: accessory manufacturers +are encouraged to add features while keeping these requirements in mind. +</p> + +<h2 id="adapter-type">Adapter type</h2> +<p> +Only digital-to-analog adapters are allowed. Analog-only adapters following +<a href="http://www.usb.org/">USB.org's</a> "USB Type-C Cable and Connector +Specification, Release 1.2, Appendix A" are not supported. +</p> +<h2 id="functional-overview">Functional overview</h2> +<p> +The adapter allows users to plug their existing 3.5mm accessories into devices +with USB-C ports. To do this, the adapter supports: +</p> +<ul> + <li>Stereo analog devices with and without microphones</li> + <li>Digital to analog conversion of 2 output channels</li> + <li>Analog to digital conversion of 1 input channel</li> + <li>Detection of analog device insertion</li> + <li>Detection of headset microphone</li> + <li>Detection of output impedance</li> + <li>Translation of headset button events to HID events</li> +</ul> + +<h2 id="analog-interface">Analog interface</h2> +<p> +The adapter shall not present any UAC interface, playback, or capture endpoints +to the USB host until a device is inserted and properly identified. Depending on +the type of device detected, the following UAC terminal types must be reported: +</p> + +<ul> + <li><strong>Headphones</strong>. Low impedance transducers, < 1 kiloohm, no + microphone: 0x0302</li> + <li><strong>Headset</strong>. Low impedance transducers with microphone: 0x0402</li> + <li><strong>Line in</strong>. High impedance input: 0x603</li> + <li><strong>Line out</strong>. High impedance output: 0x604</li> + <li><strong>Line in and Line out</strong> or <strong>Line in and Mic</strong>: + 0x400</li> +</ul> + +<h2 id="button-functions">Button functions</h2> +<p> +The adapter shall convert button events received from the analog interface and +conforming to the Android +<a href="/devices/accessories/headset/plug-headset-spec">analog headset +specification</a> to the following HID events: </p> +<table> + <tr> + <th>Function</th> + <th>Mappings</th> + </tr> + <tr> + <td>A</td> + <td>HID usage page: 0x0C<br> + HID usage: 0x0CD </td> + </tr> + <tr> + <td>B </td> + <td>HID usage page: 0x0C<br> + HID usage: 0x0E9</td> + </tr> + <tr> + <td>C</td> + <td>HID usage page: 0x0C<br> + HID usage: 0x0EA</td> + </tr> + <tr> + <td>D </td> + <td>HID usage page: 0x0C<br> + HID usage: 0x0CF</td> + </tr> +</table> + + </body></html> + + diff --git a/en/devices/accessories/headset/usb-device.html b/en/devices/accessories/headset/usb-device.html new file mode 100644 index 00000000..4cc73939 --- /dev/null +++ b/en/devices/accessories/headset/usb-device.html @@ -0,0 +1,124 @@ +<html devsite> + <head> + <title>USB Headset: Device Specification</title> + <meta name="project_path" value="/_project.yaml" /> + <meta name="book_path" value="/_book.yaml" /> + </head> + <body> + <!-- + Copyright 2017 The Android Open Source Project + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. + --> + + + +<p> +For USB headsets to work seamlessly across the Android ecosystem, Android +devices must support them uniformly. This documentation specifies USB +behavior to support USB headsets and adapters across the Android ecosystem. +</p> + +<h2 id="software-mapping">Software mapping</h2> +<p> +Compatible USB headsets are required to support compatible HID mappings. +Device support is required for the following keycode mappings. +</p> + +<table> + <tr> + <th>Function</th> + <th>Mappings</th> + <th>Context</th> + <th>Behavior</th> + </tr> + <tr> + <td rowspan="6">A</td> + <td rowspan="6"><strong>HID usage page</strong>: 0x0C<br> + <strong>HID usage</strong>: 0x0CD<br> + <strong>Kernel key</strong>: <code>KEY_PLAYPAUSE</code><br> + <strong>Android key</strong>: <code>KEYCODE_MEDIA_PLAY_PAUSE</code></td> + <td rowspan="2">Media playback</td> + <td><strong>Input</strong>: Short press<br> + <strong>Output</strong>: Play or pause</td> + </tr> + <tr> + <td><strong>Input</strong>: Long press<br> + <strong>Output</strong>: Launch voice command<br> + <strong>Sends</strong>: + <code>android.speech.action.VOICE_SEARCH_HANDS_FREE</code> if the device + is locked or its screen is off. Sends + <code>android.speech.RecognizerIntent.ACTION_WEB_SEARCH</code> otherwise</td> + </tr> + <tr> + <td rowspan="2">Incoming call</td> + <td><strong>Input</strong>: Short press<br> + <strong>Output</strong>: Accept call</td> + </tr> + <tr> + <td><strong>Input</strong>: Long press<br> + <strong>Output</strong>: Reject call</td> + </tr> + <tr> + <td rowspan="2">Ongoing call</td> + <td><strong>Input</strong>: Short press<br> + <strong>Output</strong>: End call</td> + </tr> + <tr> + <td><strong>Input</strong>: Long press<br> + <strong>Output</strong>: Mute or unmute microphone</td> + </tr> + <tr> + <td>B</td> + <td><strong>HID usage page</strong>: 0x0C<br> + <strong>HID usage</strong>: 0x0E9<br> + <strong>Kernel key</strong>: <code>KEY_VOLUMEUP</code><br> + <strong>Android key</strong>: <code>VOLUME_UP</code></td> + <td>Media playback, Ongoing call</td> + <td><strong>Input</strong>: Short or long press<br> + <strong>Output</strong>: Increases the system or headset volume</td> + </tr> + <tr> + <td>C</td> + <td><strong>HID usage page</strong>: 0x0C<br> + <strong>HID usage</strong>: 0x0EA<br> + <strong>Kernel key</strong>: <code>KEY_VOLUMEDOWN</code><br> + <strong>Android key</strong>: <code>VOLUME_DOWN</code></td> + <td>Media playback, Ongoing call</td> + <td><strong>Input</strong>: Short or long press<br> + <strong>Output</strong>: Decreases the system or headset volume</td> + </tr> + <tr> + <td>D</td> + <td><strong>HID usage page</strong>: 0x0C<br> + <strong>HID usage</strong>: 0x0CF<br> + <strong>Kernel key</strong>: <code>KEY_VOICECOMMAND</code><br> + <strong>Android key</strong>: <code>KEYCODE_VOICE_ASSIST</code></td> + <td>All. Can be triggered in any instance.</td> + <td><strong>Input</strong>: Short or long press<br> + <strong>Output</strong>: Launch voice command</td> + </tr> +</table> + +<h2 id="mechanical">Mechanical</h2> +<p> +Device manufacturers should also consult the +<a href="/devices/audio/usb.html">USB Digital Audio</a> page for more +information about USB implementation on Android. +Device manufacturers must also follow the requirements in the +<a href="/compatibility/android-cdd.html#7_7_usb">USB section</a> of +the Android CDD. +</p> + + </body> +</html> diff --git a/en/devices/accessories/headset/usb-headset-spec.html b/en/devices/accessories/headset/usb-headset-spec.html index 3279eee1..9302fe09 100644 --- a/en/devices/accessories/headset/usb-headset-spec.html +++ b/en/devices/accessories/headset/usb-headset-spec.html @@ -24,25 +24,34 @@ <p> -This documentation specifies USB headset buttons behavior to function uniformly -across the Android ecosystem. Device manufacturers should also consult the -<a href="/devices/audio/usb.html">USB -Digital Audio</a> page for more information about USB implementation on Android -and the <a href="/compatibility/android-cdd.html">Android Compatibility -Definition Document (CDD)</a> for requirements related to Android devices. -</p> -<p>There are also specifications for -<a href="plug-headset-spec.html">3.5 mm headsets</a> for accessory manufacturers and -<a href="jack-headset-spec.html">3.5 mm jacks</a> for device manufacturers. +This documentation specifies some characteristics of USB headsets, so that +they function uniformly across the Android ecosystem. Only headsets with +digital USB audio interface are permitted. Purely analog headsets with +mechanical adaptation to USB-C are not permitted, as per USB Type-C +specification. </p> <p> This documentation specifies the minimum requirements: accessory manufacturers are encouraged to add features while keeping these requirements in mind. </p> -<h2 id="control-function-mapping">Control-function mapping</h2> + +<h2 id="functional-overview">Functional overview</h2> +<p> +USB headsets can implement a variety of basic and advanced features. This +specification only covers mandated basic features: +</p> +<ul> + <li>Stereo output</li> + <li>Optional, but recommended, microphone</li> + <li>Function buttons for volume, playback, and call control</li> +</ul> + +<h2 id="control-function">Control functions</h2> +<p>Headsets can come with varying number of buttons to control specific +functions, such as volume and play/pause.<p> <table> <tr> - <th>Control Function</th> + <th>Control function</th> <th>Accessory Support</th> <th>Description</th> </tr> @@ -92,82 +101,34 @@ on a second key press). <h2 id="software-mapping">Software mapping</h2> <p> Compatible USB headsets are required to support the following software mappings -for the headset buttons. Device support is required for the following software -mappings. +for the headset buttons. Devices match these HID mappings with the appropriate +Android keycode. </p> <table> <tr> <th>Function</th> <th>Mappings</th> - <th>Context</th> - <th>Behavior</th> - </tr> - <tr> - <td rowspan="6">A</td> - <td rowspan="6"><strong>HID usage page</strong>: 0x0C<br> - <strong>HID usage</strong>: 0x0CD<br> - <strong>Kernel key</strong>: <code>KEY_PLAYPAUSE</code><br> - <strong>Android key</strong>: <code>KEYCODE_MEDIA_PLAY_PAUSE</code></td> - <td rowspan="2">Media playback</td> - <td><strong>Input</strong>: Short press<br> - <strong>Output</strong>: Play or pause</td> - </tr> - <tr> - <td><strong>Input</strong>: Long press<br> - <strong>Output</strong>: Launch voice command<br> - <strong>Sends</strong>: - <code>android.speech.action.VOICE_SEARCH_HANDS_FREE</code> if the device - is locked or its screen is off. Sends - <code>android.speech.RecognizerIntent.ACTION_WEB_SEARCH</code> otherwise</td> - </tr> - <tr> - <td rowspan="2">Incoming call</td> - <td><strong>Input</strong>: Short press<br> - <strong>Output</strong>: Accept call</td> </tr> <tr> - <td><strong>Input</strong>: Long press<br> - <strong>Output</strong>: Reject call</td> - </tr> - <tr> - <td rowspan="2">Ongoing call</td> - <td><strong>Input</strong>: Short press<br> - <strong>Output</strong>: End call</td> - </tr> - <tr> - <td><strong>Input</strong>: Long press<br> - <strong>Output</strong>: Mute or unmute microphone</td> + <td>A</td> + <td>HID usage page: 0x0C<br> + HID usage: 0x0CD </td> </tr> <tr> - <td>B</td> - <td><strong>HID usage page</strong>: 0x0C<br> - <strong>HID usage</strong>: 0x0E9<br> - <strong>Kernel key</strong>: <code>KEY_VOLUMEUP</code><br> - <strong>Android key</strong>: <code>VOLUME_UP</code></td> - <td>Media playback, Ongoing call</td> - <td><strong>Input</strong>: Short or long press<br> - <strong>Output</strong>: Increases the system or headset volume</td> + <td>B </td> + <td>HID usage page: 0x0C<br> + HID usage: 0x0E9</td> </tr> <tr> <td>C</td> - <td><strong>HID usage page</strong>: 0x0C<br> - <strong>HID usage</strong>: 0x0EA<br> - <strong>Kernel key</strong>: <code>KEY_VOLUMEDOWN</code><br> - <strong>Android key</strong>: <code>VOLUME_DOWN</code></td> - <td>Media playback, Ongoing call</td> - <td><strong>Input</strong>: Short or long press<br> - <strong>Output</strong>: Decreases the system or headset volume</td> + <td>HID usage page: 0x0C<br> + HID usage: 0x0EA</td> </tr> <tr> - <td>D</td> - <td><strong>HID usage page</strong>: 0x0C<br> - <strong>HID usage</strong>: 0x0CF<br> - <strong>Kernel key</strong>: <code>KEY_VOICECOMMAND</code><br> - <strong>Android key</strong>: <code>KEYCODE_VOICE_ASSIST</code></td> - <td>All. Can be triggered in any instance.</td> - <td><strong>Input</strong>: Short or long press<br> - <strong>Output</strong>: Launch voice command</td> + <td>D </td> + <td>HID usage page: 0x0C<br> + HID usage: 0x0CF</td> </tr> </table> @@ -176,16 +137,17 @@ collection. For accessories without a microphone, use Headphone (Usage Page: Consumer (0x0C), Usage: Headphone (0x05)). For accesories with a microphone, use Headset (Usage Page: Telephony (0x0B), Usage: Headset (0x05)).</p> +<h2 id="output-level">Output level</h2> +<p> +The maximum sound pressure level shall comply to any regulatory requirement in +the country of destination. +</p> + <h2 id="mechanical">Mechanical</h2> <p> Accessory manufacturers must follow the requirements for USB connectors as specified by <a href="http://www.usb.org/">USB.org</a>. </p> -<p> -Device manufacturers must follow the requirements in the -<a href="/compatibility/android-cdd.html#7_7_usb">USB section</a> of -the Android CDD. -</p> </body> </html> diff --git a/en/devices/tech/ota/index.html b/en/devices/tech/ota/index.html index 7b7db75f..1565e3b2 100644 --- a/en/devices/tech/ota/index.html +++ b/en/devices/tech/ota/index.html @@ -43,7 +43,7 @@ running but idle. A/B devices do not need space to download the update package because they can apply the update as they read it from the network. This is called <em>streaming A/B</em>. A/B updates are also - know as <em>seamless updates</em>. For more information about OTA + known as <em>seamless updates</em>. For more information about OTA updates for A/B devices, see <a href="/devices/tech/ota/ab/index.html">A/B (Seamless) System Updates diff --git a/en/devices/tech/perf/boot-times.html b/en/devices/tech/perf/boot-times.html index e74ef1fc..a7588301 100644 --- a/en/devices/tech/perf/boot-times.html +++ b/en/devices/tech/perf/boot-times.html @@ -260,6 +260,12 @@ start init process, then delay those peripherals/components until later in the boot process. </p> +<pre +class="prettyprint"> +BoardConfig-common.mk: + BOARD_KERNEL_CMDLINE += initcall_debug ignore_loglevel +</pre> + <h2 id="optimizing-i-o-efficiency">Optimizing I/O efficiency</h2> <p> diff --git a/en/security/bulletin/2018-02-01.html b/en/security/bulletin/2018-02-01.html index 2b479ed8..67509dfb 100644 --- a/en/security/bulletin/2018-02-01.html +++ b/en/security/bulletin/2018-02-01.html @@ -20,7 +20,7 @@ See the License for the specific language governing permissions and limitations under the License. --> - <p><em>Published February 5, 2018</em></p> + <p><em>Published February 5, 2018 | February 7, 2018</em></p> <p> @@ -32,10 +32,9 @@ your Android version</a>. </p> <p> Android partners are notified of all issues at least a month before publication. -Source code patches for these issues will be released to the Android Open Source -Project (AOSP) repository in the next 48 hours. We will revise this bulletin -with the AOSP links when they are available. -</p> +Source code patches for these issues have been released to the Android Open +Source Project (AOSP) repository and linked from this bulletin. This bulletin +also includes links to patches outside of AOSP.</p> <p> The most severe of these issues is a critical security vulnerability in Media framework that could enable a remote attacker using a specially crafted file to @@ -115,28 +114,34 @@ a privileged process.</p> </tr> <tr> <td>CVE-2017-13228</td> - <td>A-69478425</td> + <td><a href="https://android.googlesource.com/platform/external/libavc/+/04b68a0a51729b655bcd0f5ae5ec20645eeda946"> + A-69478425</a></td> <td>RCE</td> <td>Critical</td> <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> </tr> <tr> <td>CVE-2017-13231</td> - <td>A-67962232</td> + <td><a href="https://android.googlesource.com/platform/hardware/interfaces/+/16a3cd0b0729bd53265897cf8c790013156e92ce"> + A-67962232</a> + </td> <td>EoP</td> <td>High</td> <td>8.0, 8.1</td> </tr> <tr> <td>CVE-2017-13232</td> - <td>A-68953950</td> + <td><a href="https://android.googlesource.com/platform/frameworks/av/+/6a5d1fc7cbccd85054e56542a633149622effa67"> + A-68953950</a> + </td> <td>ID</td> <td>High</td> <td>5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> </tr> <tr> <td rowspan="2">CVE-2017-13230</td> - <td rowspan="2">A-65483665</td> + <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libhevc/+/68e532d83a1b98f6b5e297d71b547ed93a68dfe3"> + A-65483665</a></td> <td>DoS</td> <td>High</td> <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> @@ -148,14 +153,18 @@ a privileged process.</p> </tr> <tr> <td>CVE-2017-13233</td> - <td>A-62851602</td> + <td><a href="https://android.googlesource.com/platform/external/libhevc/+/a22314db4e0cfe11ef3e50dac6a13d52f7a595b3"> + A-62851602</a> + </td> <td>DoS</td> <td>High</td> <td>5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> </tr> <tr> <td>CVE-2017-13234</td> - <td>A-68159767</td> + <td><a href="https://android.googlesource.com/platform/external/sonivox/+/33f45caed3b60bf81790e9b76cf82c8e8d6ed902"> + A-68159767</a> + </td> <td>DoS</td> <td>High</td> <td>5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> @@ -182,7 +191,10 @@ application to execute commands normally limited to privileged processes.</p> </tr> <tr> <td>CVE-2017-13236</td> - <td>A-68217699</td> + <td><a href="https://android.googlesource.com/platform/system/security/+/80592e62a6ae095041e95b811ad7066dd44d37f6"> + A-68217699</a> + [<a href="https://android.googlesource.com/platform/system/security/+/b49160023ee8f73ce0ac97f9f4604a34ebdecf76">2</a>] + </td> <td>EoP</td> <td>Moderate</td> <td>8.0, 8.1</td> @@ -342,11 +354,9 @@ a privileged process.</p> <tr> <td>CVE-2017-15817</td> <td>A-68992394<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ba78e506e5002cdae525dd544dbf1df0ccce1ef"> -QC-CR#2076603 [2]</a> [<a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=fe43c2b64ac81199de17efc258e95546cb0546f1"> -2</a>]</td> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ba78e506e5002cdae525dd544dbf1df0ccce1ef"> +QC-CR#2076603</a> + [<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=fe43c2b64ac81199de17efc258e95546cb0546f1">2</a>]</td> <td>RCE</td> <td>Critical</td> <td>WLan</td> @@ -354,11 +364,9 @@ href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan <tr> <td>CVE-2017-17760</td> <td>A-68992416<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=71331327ac389bff7d5af2707c4325e5b7949013"> -QC-CR#2082544 [2]</a> [<a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a6afff2717791ceb281354833d4489123ae62605"> -2</a>]</td> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=71331327ac389bff7d5af2707c4325e5b7949013"> +QC-CR#2082544</a> + [<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a6afff2717791ceb281354833d4489123ae62605">2</a>]</td> <td>RCE</td> <td>Critical</td> <td>WLan</td> @@ -382,8 +390,7 @@ href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan <tr> <td>CVE-2017-17765</td> <td>A-68992445<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=66e561b0c7fff54e8cacd87d2b7d9bb3eef4f13b"> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=66e561b0c7fff54e8cacd87d2b7d9bb3eef4f13b"> QC-CR#2115112</a></td> <td>EoP</td> <td>High</td> @@ -392,8 +399,7 @@ QC-CR#2115112</a></td> <tr> <td>CVE-2017-17762</td> <td>A-68992439<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=41ee23cd0972ef2ed47dd76eb7cd44a0268e4f9f"> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=41ee23cd0972ef2ed47dd76eb7cd44a0268e4f9f"> QC-CR#2114426</a></td> <td>EoP</td> <td>High</td> @@ -402,8 +408,7 @@ QC-CR#2114426</a></td> <tr> <td>CVE-2017-14884</td> <td>A-68992429<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0ce15ef4075719a82858b7324690be7011cab832"> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0ce15ef4075719a82858b7324690be7011cab832"> QC-CR#2113052</a></td> <td>EoP</td> <td>High</td> @@ -412,8 +417,7 @@ QC-CR#2113052</a></td> <tr> <td>CVE-2017-15829</td> <td>A-68992397<br /> - <a -href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=c1b60e554e158bfcf6932ed2c543c309236e0f79"> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=c1b60e554e158bfcf6932ed2c543c309236e0f79"> QC-CR#2097917</a></td> <td>EoP</td> <td>High</td> @@ -422,8 +426,7 @@ QC-CR#2097917</a></td> <tr> <td>CVE-2017-15820</td> <td>A-68992396<br /> - <a -href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=7599c5b7d87248b4772d6c4b70ccb922704c8095"> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=7599c5b7d87248b4772d6c4b70ccb922704c8095"> QC-CR#2093377</a></td> <td>EoP</td> <td>High</td> @@ -432,8 +435,7 @@ QC-CR#2093377</a></td> <tr> <td>CVE-2017-17764</td> <td>A-68992443<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f451565c052a0322565225515f46be677c0d1b18"> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f451565c052a0322565225515f46be677c0d1b18"> QC-CR#2114789</a></td> <td>EoP</td> <td>High</td> @@ -442,8 +444,7 @@ QC-CR#2114789</a></td> <tr> <td>CVE-2017-17761</td> <td>A-68992434<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=13e3a516935a0dd90a7bc39e51c30c1592c548b7"> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=13e3a516935a0dd90a7bc39e51c30c1592c548b7"> QC-CR#2114187</a></td> <td>EoP</td> <td>High</td> @@ -638,5 +639,10 @@ security bulletins. <td>February 5, 2018</td> <td>Bulletin published.</td> </tr> + <tr> + <td>1.1</td> + <td>February 7, 2018</td> + <td>Bulletin revise to include AOSP links.</td> + </tr> </table> </body></html> diff --git a/en/security/bulletin/_translation.yaml b/en/security/bulletin/_translation.yaml index 53f84959..88a35ea5 100644 --- a/en/security/bulletin/_translation.yaml +++ b/en/security/bulletin/_translation.yaml @@ -1,3 +1,36 @@ +ignore_paths: +- /security/bulletin/2017.html +- /security/bulletin/2017-12-01.html +- /security/bulletin/2017-11-01.html +- /security/bulletin/2017-10-01.html +- /security/bulletin/2017-09-01.html +- /security/bulletin/2017-08-01.html +- /security/bulletin/2017-07-01.html +- /security/bulletin/2017-06-01.html +- /security/bulletin/2017-05-01.html +- /security/bulletin/2017-04-01.html +- /security/bulletin/2017-03-01.html +- /security/bulletin/2017-02-01.html +- /security/bulletin/2017-01-01.html +- /security/bulletin/2016.html +- /security/bulletin/2016-12-01.html +- /security/bulletin/2016-11-01.html +- /security/bulletin/2016-10-01.html +- /security/bulletin/2016-09-01.html +- /security/bulletin/2016-08-01.html +- /security/bulletin/2016-07-01.html +- /security/bulletin/2016-06-01.html +- /security/bulletin/2016-05-01.html +- /security/bulletin/2016-04-02.html +- /security/bulletin/2016-03-01.html +- /security/bulletin/2016-02-01.html +- /security/bulletin/2016-01-01.html +- /security/bulletin/2015.html +- /security/bulletin/2015-12-01.html +- /security/bulletin/2015-11-01.html +- /security/bulletin/2015-10-01.html +- /security/bulletin/2015-09-01.html +- /security/bulletin/2015-08-01.html enable_continuous_translation: True title: Android Security Bulletins description: Translations for Android Security Bulletins diff --git a/en/security/bulletin/pixel/2018-02-01.html b/en/security/bulletin/pixel/2018-02-01.html index 695ffd4b..6ebbbb9e 100644 --- a/en/security/bulletin/pixel/2018-02-01.html +++ b/en/security/bulletin/pixel/2018-02-01.html @@ -22,7 +22,7 @@ --> -<p><em>Published February 5, 2018</em></p> +<p><em>Published February 5, 2018 | Updated February 7, 2018</em></p> <p> The Pixel / Nexus Security Bulletin contains details of security @@ -80,14 +80,16 @@ additional references are linked to numbers following the bug ID. </tr> <tr> <td>CVE-2017-13239</td> - <td>A-66244132</td> + <td>A-66244132<a href="#asterisk">*</a></td> <td>ID</td> <td>Moderate</td> <td>8.0</td> </tr> <tr> <td>CVE-2017-13240</td> - <td>A-68694819</td> + <td><a href="https://android.googlesource.com/platform/frameworks/base/+/5025791ac6d1538224e19189397de8d71dcb1a12"> + A-68694819</a> + </td> <td>ID</td> <td>Moderate</td> <td>8.0, 8.1</td> @@ -112,14 +114,17 @@ additional references are linked to numbers following the bug ID. </tr> <tr> <td>CVE-2017-13241</td> - <td>A-69065651</td> + <td><a href="https://android.googlesource.com/platform/frameworks/av/+/158af2ed6d9d03ff24fe1d12ea6eb6a7bbcce383"> + A-69065651</a> + </td> <td>ID</td> <td>Moderate</td> <td>5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> </tr> <tr> <td rowspan="2">CVE-2017-13229</td> - <td rowspan="2">A-68160703</td> + <td rowspan="2"><a href="https://android.googlesource.com/platform/external/sonivox/+/f3decaa147faaf090a23b65239658a6749a4e80c"> + A-68160703</a></td> <td>RCE</td> <td>Moderate</td> <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> @@ -131,7 +136,8 @@ additional references are linked to numbers following the bug ID. </tr> <tr> <td rowspan="2">CVE-2017-13235</td> - <td rowspan="2">A-68342866</td> + <td rowspan="2"><a href="https://android.googlesource.com/platform/frameworks/av/+/28e9a544ef076b5cadb30066b2e283017ad9e3b3"> + A-68342866</a></td> <td>NSI</td> <td>NSI</td> <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> @@ -161,14 +167,17 @@ additional references are linked to numbers following the bug ID. </tr> <tr> <td>CVE-2017-13242</td> - <td>A-62672248</td> + <td><a href="https://android.googlesource.com/platform/packages/apps/Settings/+/26e2b2456a444777de114f728c4dc2af88c2fb03"> + A-62672248</a> + [<a href="https://android.googlesource.com/platform/packages/apps/Settings/+/7ed7d00e6028234088b58bf6d6d9362a5effece1">2</a>] + </td> <td>ID</td> <td>Moderate</td> <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> </tr> <tr> <td>CVE-2017-13243</td> - <td>A-38258991</td> + <td>A-38258991<a href="#asterisk">*</a></td> <td>ID</td> <td>Moderate</td> <td>5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</td> @@ -208,8 +217,7 @@ additional references are linked to numbers following the bug ID. <tr> <td>CVE-2017-1000405</td> <td>A-69934280<br /> - <a -href="https://github.com/torvalds/linux/commit/a8f97366452ed491d13cf1e44241bc0b5740b1f0"> + <a href="https://github.com/torvalds/linux/commit/a8f97366452ed491d13cf1e44241bc0b5740b1f0"> Upstream kernel</a></td> <td>EoP</td> <td>Moderate</td> @@ -243,8 +251,7 @@ Upstream kernel</a></td> <tr> <td>CVE-2017-15859</td> <td>A-65468985<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d"> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d"> QC-CR#2059715</a></td> <td>ID</td> <td>Moderate</td> @@ -261,8 +268,7 @@ QC-CR#2059715</a></td> <tr> <td>CVE-2017-9723</td> <td>A-68992479<br /> - <a -href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=e83ebd2098009b0d336ffab11e00f739902bd5d9"> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=e83ebd2098009b0d336ffab11e00f739902bd5d9"> QC-CR#2007828</a></td> <td>EoP</td> <td>Moderate</td> @@ -271,10 +277,9 @@ QC-CR#2007828</a></td> <tr> <td>CVE-2017-14881</td> <td>A-68992478<br /> - <a -href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=81ea9c34f575422a78015535c619500c34b8a69c"> -QC-CR#2087492</a> [<a -href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=1e14c7342bbb55f4ff761cf8cb7374750620c903">2</a>]</td> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=81ea9c34f575422a78015535c619500c34b8a69c"> +QC-CR#2087492</a> + [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=1e14c7342bbb55f4ff761cf8cb7374750620c903">2</a>]</td> <td>EoP</td> <td>Moderate</td> <td>ipa driver</td> @@ -282,10 +287,9 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=1e14c7342 <tr> <td>CVE-2017-14877</td> <td>A-68992473<br /> - <a -href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=ca395c15c49cf6463a39d197b6a9331d183d94cb"> -QC-CR#2057803</a> [<a -href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c2fd287bf16dc5e9f98145ba91083bdc56dfc01f">2</a>]</td> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=ca395c15c49cf6463a39d197b6a9331d183d94cb"> +QC-CR#2057803</a> + [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c2fd287bf16dc5e9f98145ba91083bdc56dfc01f">2</a>]</td> <td>EoP</td> <td>Moderate</td> <td>ipa driver</td> @@ -293,10 +297,9 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c2fd287bf <tr> <td>CVE-2017-15826</td> <td>A-68992471<br /> - <a -href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=5ac3e9d038a7ee7edf77dde2dffae6f8ba528848"> -QC-CR#2100085</a> [<a -href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=46db8f8292f71d0086140ae90bce5ae8ff161cb1">2</a>]</td> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=5ac3e9d038a7ee7edf77dde2dffae6f8ba528848"> +QC-CR#2100085</a> + [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=46db8f8292f71d0086140ae90bce5ae8ff161cb1">2</a>]</td> <td>EoP</td> <td>Moderate</td> <td>MDSS rotator</td> @@ -304,8 +307,7 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=46db8f829 <tr> <td>CVE-2017-14876</td> <td>A-68992468<br /> - <a -href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=f26dbd9d9491333766ba383044064b1304127ac0"> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=f26dbd9d9491333766ba383044064b1304127ac0"> QC-CR#2054041</a></td> <td>EoP</td> <td>Moderate</td> @@ -314,8 +316,7 @@ QC-CR#2054041</a></td> <tr> <td>CVE-2017-14892</td> <td>A-68992455<br /> - <a -href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=a3bed71777c133cfec78b5140877c6ba109961a0"> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=a3bed71777c133cfec78b5140877c6ba109961a0"> QC-CR#2096407</a></td> <td>EoP</td> <td>Moderate</td> @@ -324,8 +325,7 @@ QC-CR#2096407</a></td> <tr> <td>CVE-2017-17766</td> <td>A-68992448<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a37d8a78f5bd0e9a2c91de46721a6d80bd229a43"> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a37d8a78f5bd0e9a2c91de46721a6d80bd229a43"> QC-CR#2115366</a></td> <td>EoP</td> <td>Moderate</td> @@ -334,8 +334,7 @@ QC-CR#2115366</a></td> <tr> <td>CVE-2017-15823</td> <td>A-68992447<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=49c1ce19c8a4689c33e6e8f17ab77d77fae6ff93"> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=49c1ce19c8a4689c33e6e8f17ab77d77fae6ff93"> QC-CR#2115365</a></td> <td>EoP</td> <td>Moderate</td> @@ -352,10 +351,9 @@ QC-CR#2115365</a></td> <tr> <td>CVE-2017-15846</td> <td>A-67713103<br /> - <a -href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9fdbd92ec9196ba3629f68f4c22342aa6eedc960"> -QC-CR#2083314</a> [<a -href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9c18cc5551afc7318f57571611252fa80e1753a0">2</a>]</td> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9fdbd92ec9196ba3629f68f4c22342aa6eedc960"> +QC-CR#2083314</a> + [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9c18cc5551afc7318f57571611252fa80e1753a0">2</a>]</td> <td>EoP</td> <td>Moderate</td> <td>Camera</td> @@ -363,8 +361,7 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9c18cc555 <tr> <td>CVE-2017-14883</td> <td>A-68992426<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=3de34af4e2ca91e1a2260deb380b81620a631c85"> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=3de34af4e2ca91e1a2260deb380b81620a631c85"> QC-CR#2112832</a></td> <td>EoP</td> <td>Moderate</td> @@ -373,8 +370,7 @@ QC-CR#2112832</a></td> <tr> <td>CVE-2017-11043</td> <td>A-68992421<br /> - <a -href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=befd1f713a72b992ee63970b7e3d1d7a32ba5a01"> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=befd1f713a72b992ee63970b7e3d1d7a32ba5a01"> QC-CR#2091584</a></td> <td>EoP</td> <td>Moderate</td> @@ -383,8 +379,7 @@ QC-CR#2091584</a></td> <tr> <td>CVE-2017-14875</td> <td>A-68992465<br /> - <a -href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=755261330733bb2440907a8407ed691c99451ddc"> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=755261330733bb2440907a8407ed691c99451ddc"> QC-CR#2042147</a></td> <td>ID</td> <td>Moderate</td> @@ -393,8 +388,7 @@ QC-CR#2042147</a></td> <tr> <td>CVE-2017-14891</td> <td>A-68992453<br /> - <a -href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=736667bf08b03fdca824e88b901c2dbdd6703a0c"> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=736667bf08b03fdca824e88b901c2dbdd6703a0c"> QC-CR#2096006</a></td> <td>ID</td> <td>Moderate</td> @@ -403,8 +397,7 @@ QC-CR#2096006</a></td> <tr> <td>CVE-2017-17771</td> <td>A-38196031<br /> - <a -href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=a452045792bc09548b4e1b940aa8adfed822b51c"> + <a href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=a452045792bc09548b4e1b940aa8adfed822b51c"> QC-CR#2003798</a></td> <td>EoP</td> <td>Moderate</td> @@ -467,7 +460,7 @@ and a summary of the issue. </tr> <tr> <td>A-69349260</td> - <td>App Compatibility</td> + <td>App compatibility</td> <td>Improved RSA key parsing from byte arrays.</td> <td>All</td> </tr> @@ -479,7 +472,7 @@ and a summary of the issue. </tr> <tr> <td>A-69797895</td> - <td>Mobile Data</td> + <td>Mobile data</td> <td>Improved data performance for Telus users in certain network environments.</td> <td>Pixel 2</td> @@ -511,8 +504,8 @@ bulletin. <p> Security patch levels of 2018-02-05 or later address all issues associated with the 2018-02-05 security patch level and all previous patch levels. To learn how -to check a device's security patch level, read the instructions on the <a -href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel +to check a device's security patch level, read the instructions on the +<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel and Nexus update schedule</a>. </p> <p id="type"> @@ -593,8 +586,8 @@ column mean?</strong> <p> Issues that are not publicly available have a * next to the Android bug ID in the <em>References</em> column. The update for that issue is generally contained -in the latest binary drivers for Nexus devices available from the <a -href="https://developers.google.com/android/nexus/drivers">Google Developer +in the latest binary drivers for Nexus devices available from the +<a href="https://developers.google.com/android/nexus/drivers">Google Developer site</a>. </p> <p> @@ -622,6 +615,11 @@ bulletin, are not required for declaring a security patch level. <td>February 5, 2018</td> <td>Bulletin published.</td> </tr> + <tr> + <td>1.1</td> + <td>February 7, 2018</td> + <td>Bulletin revised to include AOSP links.</td> + </tr> </table> </body></html> diff --git a/en/security/selinux/device-policy.html b/en/security/selinux/device-policy.html index 928a1faa..adfd629e 100644 --- a/en/security/selinux/device-policy.html +++ b/en/security/selinux/device-policy.html @@ -240,7 +240,7 @@ windows open:</p> <p>The intent is clear: everyone but third-party apps may have access to the debug device. </p> -<p>The rule is flawed in a few of ways. The exclusion of <code>untrusted_app</code> +<p>The rule is flawed in a few ways. The exclusion of <code>untrusted_app</code> is trivial to work around because all apps may optionally run services in the <code>isolated_app</code> domain. Likewise, if new domains for third-party apps are added to AOSP, they will also have access to <code>scary_debug_device</code>. |