diff options
Diffstat (limited to 'en/security/bulletin/pixel/2018-04-01.html')
-rw-r--r-- | en/security/bulletin/pixel/2018-04-01.html | 1037 |
1 files changed, 1037 insertions, 0 deletions
diff --git a/en/security/bulletin/pixel/2018-04-01.html b/en/security/bulletin/pixel/2018-04-01.html new file mode 100644 index 00000000..0322f70a --- /dev/null +++ b/en/security/bulletin/pixel/2018-04-01.html @@ -0,0 +1,1037 @@ +<html devsite> + <head> + <title>Pixel / Nexus Security Bulletin—April 2018</title> + <meta name="project_path" value="/_project.yaml" /> + <meta name="book_path" value="/_book.yaml" /> + </head> + <body> + <!-- + Copyright 2018 The Android Open Source Project + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + //www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. + --> + + +<p><em>Published April 2, 2018 | Updated April 4, 2018</em></p> + +<p> +The Pixel / Nexus Security Bulletin contains details of security +vulnerabilities and functional improvements affecting +<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">supported +Google Pixel and Nexus devices</a> (Google devices). For Google devices, +security patch levels of 2018-04-05 or later address all issues in this +bulletin and all issues in the <a href="/security/bulletin/2018-04-01">April +2018 Android Security Bulletin</a>. To learn how to check a device's security +patch level, see <a href="https://support.google.com/pixelphone/answer/4457705">Check +and update your Android version</a>.</p> +<p> +All supported Google devices will receive an update to the 2018-04-05 patch +level. We encourage all customers to accept these updates to their devices. +</p> +<p class="note"> +<strong>Note:</strong> The Google device firmware images are available on the +<a href="https://developers.google.com/android/nexus/images">Google Developer +site</a>. +</p> + +<h2 id="announcements">Announcements</h2> +<p>In addition to the security vulnerabilities described in the +<a href="/security/bulletin/2018-04-01">April 2018 Android Security Bulletin</a>, +Google devices also contain patches for the security vulnerabilities +described below. Partners were notified of these issues at least a month ago +and may choose to incorporate them as part of their device updates.</p> + +<h2 id="security-patches">Security patches</h2> +<p> +Vulnerabilities are grouped under the component that they affect. There is a +description of the issue and a table with the CVE, associated references, +<a href="#type">type of vulnerability</a>, +<a href="https://source.android.com/security/overview/updates-resources.html#severity">severity</a>, +and updated Android Open Source Project (AOSP) versions (where applicable). When +available, we link the public change that addressed the issue to the bug ID, +like the AOSP change list. When multiple changes relate to a single bug, +additional references are linked to numbers following the bug ID. +</p> + +<h3 id="framework">Framework</h3> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Updated AOSP versions</th> + </tr> + <tr> + <td>CVE-2017-13294</td> + <td><a href="https://android.googlesource.com/platform/packages/apps/Email/+/c3e0aba2a604ce7c3807d65df1e6a2b848287019">A-71814449</a> + [<a href="https://android.googlesource.com/platform/packages/apps/UnifiedEmail/+/e00598532bbfc8618b7c051cbf6bd15491f61f27">2</a>]</td> + <td>ID</td> + <td>Moderate</td> + <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> + <tr> + <td>CVE-2017-13295</td> + <td><a href="https://android.googlesource.com/platform/frameworks/base/+/a2a36541f0b3603335e74da0a8d2b6a9d5bcec3f">A-62537081</a></td> + <td>DoS</td> + <td>Moderate</td> + <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> +</table> + + +<h3 id="media-framework">Media framework</h3> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Updated AOSP versions</th> + </tr> + <tr> + <td>CVE-2017-13300</td> + <td>A-71567394<a href="#asterisk">*</a></td> + <td>DoS</td> + <td>High</td> + <td>6.0, 6.0.1</td> + </tr> + <tr> + <td rowspan="2">CVE-2017-13296</td> + <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libavc/+/3e3e81ede5229c5a9c6b7bf6a63844ecf07ae3ae">A-70897454</a></td> + <td>ID</td> + <td>Moderate</td> + <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> + <tr> + <td>DoS</td> + <td>High</td> + <td>6.0, 6.0.1</td> + </tr> + <tr> + <td rowspan="2">CVE-2017-13297</td> + <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libhevc/+/daaece3e79db33f6c473bb54a39933d387a9bf95">A-71766721</a></td> + <td>ID</td> + <td>Moderate</td> + <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> + <tr> + <td>DoS</td> + <td>High</td> + <td>6.0, 6.0.1</td> + </tr> + <tr> + <td rowspan="2">CVE-2017-13298</td> + <td rowspan="2"><a href="https://android.googlesource.com/platform/frameworks/av/+/12e25a753f4b6f0aa935e54bae66023bd8321598">A-72117051</a></td> + <td>ID</td> + <td>Moderate</td> + <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> + <tr> + <td>DoS</td> + <td>High</td> + <td>6.0, 6.0.1</td> + </tr> + <tr> + <td rowspan="2">CVE-2017-13299</td> + <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libavc/+/d849abf312a365553ce68aec32dea93230036abe">A-70897394</a></td> + <td>NSI</td> + <td>NSI</td> + <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> + </tr> + <tr> + <td>DoS</td> + <td>High</td> + <td>6.0, 6.0.1</td> + </tr> +</table> + + +<h3 id="system">System</h3> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Updated AOSP versions</th> + </tr> + <tr> + <td>CVE-2017-13301</td> + <td><a href="https://android.googlesource.com/platform/frameworks/base/+/384689934d293acf532e3fea3e72ef78df4f2d1e">A-66498711</a> + [<a href="https://android.googlesource.com/platform/frameworks/base/+/d52b215f82e464705373d794748325298f0a1f9a">2</a>]</td> + <td>DoS</td> + <td>Moderate</td> + <td>8.0</td> + </tr> + <tr> + <td>CVE-2017-13302</td> + <td><a href="https://android.googlesource.com/platform/frameworks/base/+/e54ad58aea33860fbb36bf828684e3df6393f602">A-69969749</a></td> + <td>DoS</td> + <td>Moderate</td> + <td>8.0</td> + </tr> +</table> + + +<h3 id="broadcom-components">Broadcom components</h3> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Component</th> + </tr> + <tr> + <td>CVE-2017-13303</td> + <td>A-71359108<a href="#asterisk">*</a><br /> + B-V2018010501</td> + <td>ID</td> + <td>Moderate</td> + <td>bcmdhd driver</td> + </tr> +</table> + + +<h3 id="kernel-components">Kernel components</h3> + +<table> + <col width="17%"> + <col width="19%"> + <col width="9%"> + <col width="14%"> + <col width="39%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Component</th> + </tr> + <tr> + <td>CVE-2017-13304</td> + <td>A-70576999<a href="#asterisk">*</a></td> + <td>ID</td> + <td>Moderate</td> + <td>mnh_sm driver</td> + </tr> + <tr> + <td>CVE-2017-13305</td> + <td>A-70526974<a href="#asterisk">*</a></td> + <td>ID</td> + <td>Moderate</td> + <td>encrypted-keys</td> + </tr> + <tr> + <td>CVE-2017-17449</td> + <td>A-70980949<br /> + <a href="https://lkml.org/lkml/2017/12/5/950">Upstream kernel</a></td> + <td>ID</td> + <td>Moderate</td> + <td>netlink tap</td> + </tr> + <tr> + <td>CVE-2017-13306</td> + <td>A-70295063<a href="#asterisk">*</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>mnh driver</td> + </tr> + <tr> + <td>CVE-2017-13307</td> + <td>A-69128924<a href="#asterisk">*</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>pci sysfs</td> + </tr> + <tr> + <td>CVE-2017-17712</td> + <td>A-71500434<br /> + <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483"> +Upstream kernel</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>net ipv4</td> + </tr> + <tr> + <td>CVE-2017-15115</td> + <td>A-70217214<br /> + <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74"> +Upstream kernel</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>sctp</td> + </tr> +</table> + + +<h3 id="qualcomm-components">Qualcomm components</h3> + +<table> + <col width="17%"> + <col width="25%"> + <col width="9%"> + <col width="14%"> + <col width="33%"> + <tr> + <th>CVE</th> + <th>References</th> + <th>Type</th> + <th>Severity</th> + <th>Component</th> + </tr> + <tr> + <td>CVE-2018-3598</td> + <td>A-71501698<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=bfd8ffc65e6e82de2adceba58bd67137fb3b2024"> +QC-CR#1097390</a></td> + <td>ID</td> + <td>Moderate</td> + <td>camera_v2 driver</td> + </tr> + <tr> + <td>CVE-2018-5826</td> + <td>A-69128800<a href="#asterisk">*</a><br /> + QC-CR#2157283</td> + <td>ID</td> + <td>Moderate</td> + <td>qcacld-3.0 hdd driver</td> + </tr> + <tr> + <td>CVE-2017-15853</td> + <td>A-65853393<a href="#asterisk">*</a><br /> + QC-CR#2116517<br /> + QC-CR#2125577</td> + <td>ID</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-3584</td> + <td>A-64610600<a href="#asterisk">*</a><br /> + QC-CR#2142046</td> + <td>ID</td> + <td>Moderate</td> + <td>rmnet_usb</td> + </tr> + <tr> + <td>CVE-2017-8269</td> + <td>A-33967002<a href="#asterisk">*</a><br /> + QC-CR#2013145<br /> + QC-CR#2114278</td> + <td>ID</td> + <td>Moderate</td> + <td>IPA driver</td> + </tr> + <tr> + <td>CVE-2017-15837</td> + <td>A-64403015<a href="#asterisk">*</a><br /> + QC-CR#2116387</td> + <td>ID</td> + <td>Moderate</td> + <td>NL80211 driver</td> + </tr> + <tr> + <td>CVE-2018-5823</td> + <td>A-72957335<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=fc5bbedd4ab9fd5239be8618afe714d39dd8de49"> +QC-CR#2139436</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-5825</td> + <td>A-72957269<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=5ae227670444cf8ea7b8a8d98eab41404a03332f">QC-CR#2151146</a> + [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=cf0f031ffbb6a8e08e517f653045c3f81d7f2663">2</a>] + [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=09a34b7878a732187f9138900667d8abb2b1c39c">3</a>]</td> + <td>EoP</td> + <td>Moderate</td> + <td>IPA driver</td> + </tr> + <tr> + <td>CVE-2018-5824</td> + <td>A-72957235<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=b34f6f3afe229e32a32418f75889279f6e00d157">QC-CR#2149399</a> + [<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=d3a92a1656a3ee2fc44d4ff98614a4f5b70f1893">2</a>]</td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-5827</td> + <td>A-72956920<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=53e6d889ac29336ba212a0d4a987455a85736fa8"> +QC-CR#2161977</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-5822</td> + <td>A-71501692<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=edc42ce371b6831dc55a15bc2624175bd538aa37"> +QC-CR#2115221</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>QC WLAN</td> + </tr> + <tr> + <td>CVE-2018-5821</td> + <td>A-71501687<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=08ab943766abe845a8fae21689bae18dd74e9b20"> +QC-CR#2114363</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>modem driver</td> + </tr> + <tr> + <td>CVE-2018-5820</td> + <td>A-71501686<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a4a8475ea650c16705a3eaa011524820dc5ffd44"> +QC-CR#2114336</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>Modem driver</td> + </tr> + <tr> + <td>CVE-2018-3599</td> + <td>A-71501666<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=cf2702c1a77d2a164a3be03597eff7e6fe5f967e"> +QC-CR#2047235</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>Qualcomm Core Services</td> + </tr> + <tr> + <td>CVE-2018-3596</td> + <td>A-35263529<a href="#asterisk">*</a><br /> + QC-CR#640898</td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-3568</td> + <td>A-72957136<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=70cd30a5c1fdd02af19cf0e34c41842cce89a82d"> +QC-CR#2152824</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-3567</td> + <td>A-72956997<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=f2627fca43bc4403a445c2b84481383ac0249364">QC-CR#2147119</a> + [<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=25c131e8a807894e04f95bdeb1cbd0376eda3bea">2</a>]</td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2017-15855</td> + <td>A-72957336<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=75c0ea8622bb07716d2a82247e6dd1597980f223"> +QC-CR#2149501</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>WLAN</td> + </tr> + <tr> + <td>CVE-2018-5828</td> + <td>A-71501691<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=6299a6bf166a60a47e9108ae2119027e787432d0"> +QC-CR#2115207</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>QC WLAN</td> + </tr> + <tr> + <td>CVE-2017-15836</td> + <td>A-71501693<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=058e1eef2b1422bc0dd70f73832f1ac8a3dbe806"> +QC-CR#2119887</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>QC WLAN</td> + </tr> + <tr> + <td>CVE-2017-14890</td> + <td>A-71501695<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=234e14add09a1ba4a1b1d81d474ac3978dc94fd6"> +QC-CR#2120751</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>QC WLAN</td> + </tr> + <tr> + <td>CVE-2017-14894</td> + <td>A-71501694<br /> + <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dfca3d8173c1548a97e558cb8abd1ffd2483f8b7"> +QC-CR#2120424</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>QC WLAN</td> + </tr> + <tr> + <td>CVE-2017-14880</td> + <td>A-68992477<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=cbf3702ae1c5e2cacd6f15a5eb7a799e2f1ed96f"> +QC-CR#2078734</a> + [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=d72e444dce0b9d20fdcdc4daeb6227e3536eebf7">2</a>]</td> + <td>EoP</td> + <td>Moderate</td> + <td>IPA WAN driver</td> + </tr> + <tr> + <td>CVE-2017-11075</td> + <td>A-70237705<br /> + <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=7a07165c62926e899b710e1fed31532f31797dd5"> +QC-CR#2098332</a></td> + <td>EoP</td> + <td>Moderate</td> + <td>Audio DSP driver</td> + </tr> +</table> + +<h2 id="functional-updates">Functional updates</h2> +<p> +These updates are included for affected Pixel devices to address functionality +issues not related to the security of Pixel devices. The table includes +associated references; the affected category, such as Bluetooth or mobile data; +and a summary of the issue. +</p> + +<table> + <tr> + <th>References</th> + <th>Category</th> + <th>Improvements</th> + <th>Devices</th> + </tr> + <tr> + <td>A-35963245</td> + <td>Performance</td> + <td>Enable Assisted Dialing support</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-37681923<br> + A-68215016</td> + <td>Logging</td> + <td>Improve anomaly detection metrics</td> + <td>All</td> + </tr> + <tr> + <td>A-63908720</td> + <td>Logging</td> + <td>Improve diskstats logging</td> + <td>All</td> + </tr> + <tr> + <td>A-64101451</td> + <td>Performance</td> + <td>Improve handover from VoLTE to VoWi-Fi during Emergency calls on certain carriers</td> + <td>Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-64586126</td> + <td>Camera</td> + <td>Improve microvideo performance in Google Camera</td> + <td>Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-64610438</td> + <td>Performance</td> + <td>Reduce delays upon opening specific apps</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-65175134</td> + <td>Video</td> + <td>Improve decoding of certain video streams</td> + <td>Pixel, Pixel XL</td> + </tr> + <tr> + <td>A-65347520</td> + <td>Performance</td> + <td>Improve fingerprint and keyboard latency in certain situations</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-65490850</td> + <td>UI</td> + <td>Adjust notifications when entering or exiting Wi-Fi coverage during a video call</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-65509134</td> + <td>Connectivity</td> + <td>Enable IMS911 on certain networks</td> + <td>Pixel 2, Pixel 2 XL, Pixel, Pixel XL</td> + </tr> + <tr> + <td>A-66951771</td> + <td>Logging</td> + <td>Detect Wi-Fi Passport statistics for developers</td> + <td>All</td> + </tr> + <tr> + <td>A-66957450</td> + <td>Performance</td> + <td>Improve lock screen performance</td> + <td>All</td> + </tr> + <tr> + <td>A-67094673</td> + <td>Logging</td> + <td>Improve start time logging</td> + <td>All</td> + </tr> + <tr> + <td>A-67589241</td> + <td>Performance</td> + <td>Improve magnetic sensor performance on Pixel 2/Pixel 2 XL</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-67593274</td> + <td>Battery</td> + <td>Reduce battery drain after modem issues</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-67634615</td> + <td>Stability</td> + <td>Improve modem stability on Pixel and Pixel 2 phones</td> + <td>Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-67750231</td> + <td>UI</td> + <td>Adjust Call Forwarding UI</td> + <td>Nexus 5X, Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-67774904</td> + <td>Connectivity</td> + <td>Improve multi-calling performance over Wi-Fi</td> + <td>Pixel, Pixel XL</td> + </tr> + <tr> + <td>A-67777512</td> + <td>Connectivity</td> + <td>Improve data connectivity for T-Mobile users in parts of Australia</td> + <td>Pixel, Pixel XL</td> + </tr> + <tr> + <td>A-67882977</td> + <td>Certification</td> + <td>Update certification</td> + <td>Pixel, Pixel XL</td> + </tr> + <tr> + <td>A-68150449<br> + A-68059359<br> + A-69797741<br> + A-69378640<br> + A-68824279</td> + <td>Stability</td> + <td>Improve Wi-Fi stability on Pixel 2 phones</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-68217064</td> + <td>Performance</td> + <td>Improve handover to Wi-Fi Calling in low-coverage areas</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-68398312</td> + <td>Performance</td> + <td>Improve conference call performance over Wifi</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-68671462</td> + <td>Connectivity</td> + <td>Improve VoLTE performance for some carriers</td> + <td>Nexus 5X, Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-68841424</td> + <td>Connectivity</td> + <td>Adjust APN updating behavior</td> + <td>All</td> + </tr> + <tr> + <td>A-68863351</td> + <td>UI</td> + <td>Improve settings app icons</td> + <td>All</td> + </tr> + <tr> + <td>A-68923696<br> + A-68922470<br> + A-68940490</td> + <td>Certification</td> + <td>Upgrade certificates to ensure continued service.</td> + <td>Nexus 5X, Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-68931709</td> + <td>Developer</td> + <td>Add methods to PeerHandle API for developers</td> + <td>All</td> + </tr> + <tr> + <td>A-68959671</td> + <td>Connectivity</td> + <td>Update Verizon Service APK for Pixel phones</td> + <td>Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-69003183</td> + <td>Logging</td> + <td>Improve Wi-Fi and RPM logging</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-69017578<br> + A-68138080<br> + A-68205105<br> + A-70731000<br> + A-69574837<br> + A-68474108<br> + A-70406781</td> + <td>Connectivity, Performance</td> + <td>Improve connectivity and performance on certain carrier networks</td> + <td>Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-69064494</td> + <td>Performance</td> + <td>Improve notification listening apps</td> + <td>All</td> + </tr> + <tr> + <td>A-69152057</td> + <td>Connectivity</td> + <td>Address call forwarding issue.</td> + <td>All</td> + </tr> + <tr> + <td>A-69209000</td> + <td>Connectivity</td> + <td>Improve internet connectivity on Pixel 2 on certain WiFi networks</td> + <td>Pixel 2</td> + </tr> + <tr> + <td>A-69238007<br> + A-68202289<br> + A-69334308</td> + <td>Connectivity</td> + <td>Adjust APN settings</td> + <td>Nexus 5X, Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-69261367<br> + A-70512352</td> + <td>Messaging</td> + <td>Improve MMS messaging performance on certain carriers</td> + <td>Nexus 5X, Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-69275204</td> + <td>Battery</td> + <td>Adjust battery learned capacity increment and decrement limits</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-69334266</td> + <td>Connectivity</td> + <td>Change voice domain to CS for certain carriers</td> + <td>Pixel XL</td> + </tr> + <tr> + <td>A-69475609</td> + <td>Performance</td> + <td>Adjust timeouts for Phone App</td> + <td>All</td> + </tr> + <tr> + <td>A-69672417</td> + <td>Stability</td> + <td>Improve stability for Pixel 2 devices in certain parts of Canada</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-69848394<br> + A-68275646</td> + <td>Performance</td> + <td>Improve instant Apps performance</td> + <td>All</td> + </tr> + <tr> + <td>A-69870527</td> + <td>UI</td> + <td>Improve indicators for emergency call connectivity</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-70045970</td> + <td>Battery</td> + <td>Optimize search logic to improve battery performance.</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-70094083<br> + A-70094701</td> + <td>Battery</td> + <td>Improve battery logging for Pixel 2 and Pixel 2 XL</td> + <td>Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-70214869</td> + <td>GPS</td> + <td>Improve GPS Time performance on Pixel 2 XL</td> + <td>Pixel 2 XL</td> + </tr> + <tr> + <td>A-70338906</td> + <td>Audio</td> + <td>Improve audio speaker performance during phone calls</td> + <td>All</td> + </tr> + <tr> + <td>A-70398372</td> + <td>UI</td> + <td>Adjust advanced calling settings for Verizon</td> + <td>Nexus 5X, Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-70576351</td> + <td>Connectivity</td> + <td>Change to prioritize certain bands</td> + <td>Nexus 5X, Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-70580873<br> + A-70912923<br> + A-71497259</td> + <td>Connectivity</td> + <td>Improve in-call performance for some carriers</td> + <td>Pixel, Pixel XL, Pixel 2, Pixel 2 XL</td> + </tr> + <tr> + <td>A-70815434</td> + <td>Connectivity</td> + <td>Improve network performance on Simyo carrier</td> + <td>Nexus 5X</td> + </tr> + <tr> + <td>A-71708302</td> + <td>Logging</td> + <td>Improve connectivity metrics</td> + <td>All</td> + </tr> + <tr> + <td>A-71983424</td> + <td>Performance</td> + <td>Improve experience switching between LTE and Wifi</td> + <td>Pixel 2 XL</td> + </tr> + <tr> + <td>A-72119809</td> + <td>Connectivity</td> + <td>Improve data performance for devices with certain SIM cards</td> + <td>All</td> + </tr> + <tr> + <td>A-72175011</td> + <td>Logging</td> + <td>Improve autofill logging</td> + <td>All</td> + </tr> + <tr> + <td>A-72797728<br> + A-71599119</td> + <td>Logging</td> + <td>Improve internal troubleshooting tools</td> + <td>All</td> + </tr> + <tr> + <td>A-72871435</td> + <td>Logging</td> + <td>Improve network logging</td> + <td>All</td> + </tr> +</table> + +<h2 id="common-questions-and-answers">Common questions and answers</h2> +<p> +This section answers common questions that may occur after reading this +bulletin. +</p> +<p> +<strong>1. How do I determine if my device is updated to address these issues? +</strong> +</p> +<p> +Security patch levels of 2018-04-05 or later address all issues associated with +the 2018-04-05 security patch level and all previous patch levels. To learn how +to check a device's security patch level, read the instructions on the +<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel +and Nexus update schedule</a>. +</p> +<p id="type"> +<strong>2. What do the entries in the <em>Type</em> column mean?</strong> +</p> +<p> +Entries in the <em>Type</em> column of the vulnerability details table reference +the classification of the security vulnerability. +</p> +<table> + <col width="25%"> + <col width="75%"> + <tr> + <th>Abbreviation</th> + <th>Definition</th> + </tr> + <tr> + <td>RCE</td> + <td>Remote code execution</td> + </tr> + <tr> + <td>EoP</td> + <td>Elevation of privilege</td> + </tr> + <tr> + <td>ID</td> + <td>Information disclosure</td> + </tr> + <tr> + <td>DoS</td> + <td>Denial of service</td> + </tr> + <tr> + <td>N/A</td> + <td>Classification not available</td> + </tr> +</table> +<p> +<strong>3. What do the entries in the <em>References</em> column mean?</strong> +</p> +<p> +Entries under the <em>References</em> column of the vulnerability details table +may contain a prefix identifying the organization to which the reference value +belongs. +</p> +<table> + <col width="25%"> + <col width="75%"> + <tr> + <th>Prefix</th> + <th>Reference</th> + </tr> + <tr> + <td>A-</td> + <td>Android bug ID</td> + </tr> + <tr> + <td>QC-</td> + <td>Qualcomm reference number</td> + </tr> + <tr> + <td>M-</td> + <td>MediaTek reference number</td> + </tr> + <tr> + <td>N-</td> + <td>NVIDIA reference number</td> + </tr> + <tr> + <td>B-</td> + <td>Broadcom reference number</td> + </tr> +</table> +<p id="asterisk"> +<strong>4. What does a * next to the Android bug ID in the <em>References</em> +column mean?</strong> +</p> +<p> +Issues that are not publicly available have a * next to the Android bug ID in +the <em>References</em> column. The update for that issue is generally contained +in the latest binary drivers for Nexus devices available from the +<a href="https://developers.google.com/android/nexus/drivers">Google Developer +site</a>. +</p> +<p> +<strong>5. Why are security vulnerabilities split between this bulletin and the +Android Security Bulletins?</strong> +</p> +<p> +Security vulnerabilities that are documented in the Android Security Bulletins +are required in order to declare the latest security patch level on Android +devices. Additional security vulnerabilities, such as those documented in this +bulletin, are not required for declaring a security patch level. +</p> +<h2 id="versions">Versions</h2> +<table> + <col width="25%"> + <col width="25%"> + <col width="50%"> + <tr> + <th>Version</th> + <th>Date</th> + <th>Notes</th> + </tr> + <tr> + <td>1.0</td> + <td>April 2, 2018</td> + <td>Bulletin published.</td> + </tr> + <tr> + <td>1.1</td> + <td>April 4, 2018</td> + <td>Bulletin revised to include AOSP links.</td> + </tr> +</table> +</body></html> |