From 43777eee371e6f873e7757bbaab25763b7ed1053 Mon Sep 17 00:00:00 2001 From: Android Partner Docs Date: Tue, 13 Feb 2018 12:14:30 -0800 Subject: Docs: Changes to source.android.com - 185568049 Typo in the usb adapter spec by Danielle Roberts - 185454531 Devsite localized content from translation request f937f9... by Android Partner Docs - 185454519 Devsite localized content from translation request 379736... by Android Partner Docs - 185454514 Devsite localized content from translation request 92bc2c... by Android Partner Docs - 185454118 Devsite localized content from translation request fc1572... by Android Partner Docs - 185454110 Devsite localized content from translation request 465ee3... by Android Partner Docs - 185454102 Devsite localized content from translation request ff994d... by Android Partner Docs - 185441660 Devsite localized content from translation request 2d6e3e... by Android Partner Docs - 185441584 Devsite localized content from translation request dcfc8e... by Android Partner Docs - 185197349 Fix typo. by Android Partner Docs - 185069980 fix typo by Android Partner Docs - 185020036 Add example about optimizing kernel initcall by Android Partner Docs - 184942796 Add analog-to-USB-C adapter and USB device spec by Danielle Roberts - 184900015 Exclude old bulletins from localization by Danielle Roberts - 184880179 Update Feb 2018 bulletins with AOSP links by Danielle Roberts PiperOrigin-RevId: 185568049 Change-Id: Id2ddd64fd6d7f29d7d5dee0e900c84b1a69e2a55 --- en/_index.yaml | 14 +-- en/devices/_toc-interfaces.yaml | 24 ++-- en/devices/accessories/headset/usb-adapter.html | 112 +++++++++++++++++++ en/devices/accessories/headset/usb-device.html | 124 +++++++++++++++++++++ .../accessories/headset/usb-headset-spec.html | 118 +++++++------------- en/devices/tech/ota/index.html | 2 +- en/devices/tech/perf/boot-times.html | 6 + en/security/bulletin/2018-02-01.html | 78 +++++++------ en/security/bulletin/_translation.yaml | 33 ++++++ en/security/bulletin/pixel/2018-02-01.html | 106 +++++++++--------- en/security/selinux/device-policy.html | 2 +- 11 files changed, 432 insertions(+), 187 deletions(-) create mode 100644 en/devices/accessories/headset/usb-adapter.html create mode 100644 en/devices/accessories/headset/usb-device.html (limited to 'en') diff --git a/en/_index.yaml b/en/_index.yaml index 3f4fab67..85acc4bc 100644 --- a/en/_index.yaml +++ b/en/_index.yaml @@ -73,6 +73,13 @@ landing_page: image_path: /images/android_stack.png - heading: News items: + - heading: February Security Bulletins + description: > + The February 2018 Android and Pixel/Nexus Security Bulletins have been + published to support the February security release. + buttons: + - label: February 7th, 2018 + path: /security/bulletin/2018-02-01 - heading: ART DEX bytecode improvements description: > Android runtime (ART) now includes bytecode documentation for @@ -81,13 +88,6 @@ landing_page: buttons: - label: January 19th, 2018 path: /devices/tech/dalvik/dalvik-bytecode - - heading: January Security Bulletins - description: > - The January 2018 Android and Pixel/Nexus Security Bulletins have been - published to support the January security release. - buttons: - - label: January 2nd, 2018 - path: /security/bulletin/2018-01-01 - heading: Android 8.1 Instructions description: > The Android 8.1 release is now available and offers many new features diff --git a/en/devices/_toc-interfaces.yaml b/en/devices/_toc-interfaces.yaml index 74313cbe..dba14fbe 100644 --- a/en/devices/_toc-interfaces.yaml +++ b/en/devices/_toc-interfaces.yaml @@ -336,20 +336,24 @@ toc: section: - title: Overview path: /devices/accessories/audio - - title: Headset + - title: 3.5 mm Headset section: - - title: Overview - path: /devices/accessories/headset/ - - title: 3.5 mm Headset Spec + - title: Headset Spec path: /devices/accessories/headset/plug-headset-spec - - title: 3.5 mm Jack Spec + - title: Device Spec path: /devices/accessories/headset/jack-headset-spec - - title: USB Headset Spec + - title: USB Headset + section: + - title: Headset Spec path: /devices/accessories/headset/usb-headset-spec - - title: Expected Behavior - path: /devices/accessories/headset/expected-behavior - - title: Testing - path: /devices/accessories/headset/testing + - title: Adapter Spec + path: /devices/accessories/headset/usb-adapter + - title: Device Spec + path: /devices/accessories/headset/usb-device + - title: Expected Behavior + path: /devices/accessories/headset/expected-behavior + - title: Testing + path: /devices/accessories/headset/testing - title: Custom Accessories section: - title: Overview diff --git a/en/devices/accessories/headset/usb-adapter.html b/en/devices/accessories/headset/usb-adapter.html new file mode 100644 index 00000000..4b70bc1d --- /dev/null +++ b/en/devices/accessories/headset/usb-adapter.html @@ -0,0 +1,112 @@ + + + USB-C-to-Analog Audio Adapter + + + + + + + + +

+While some new Android phones are being produced without a 3.5 mm jack, users +may still own 3.5 mm headsets that they want to use with those devices. To +facilitate that, this article specifies a USB-C-to-analog audio adapter spec to +plug +3.5 mm headsets +into devices that only have a +USB-C port.

+

+This documentation specifies the minimum requirements: accessory manufacturers +are encouraged to add features while keeping these requirements in mind. +

+ +

Adapter type

+

+Only digital-to-analog adapters are allowed. Analog-only adapters following +USB.org's "USB Type-C Cable and Connector +Specification, Release 1.2, Appendix A" are not supported. +

+

Functional overview

+

+The adapter allows users to plug their existing 3.5mm accessories into devices +with USB-C ports. To do this, the adapter supports: +

+
    +
  • Stereo analog devices with and without microphones
  • +
  • Digital to analog conversion of 2 output channels
  • +
  • Analog to digital conversion of 1 input channel
  • +
  • Detection of analog device insertion
  • +
  • Detection of headset microphone
  • +
  • Detection of output impedance
  • +
  • Translation of headset button events to HID events
  • +
+ +

Analog interface

+

+The adapter shall not present any UAC interface, playback, or capture endpoints +to the USB host until a device is inserted and properly identified. Depending on +the type of device detected, the following UAC terminal types must be reported: +

+ +
    +
  • Headphones. Low impedance transducers, < 1 kiloohm, no + microphone: 0x0302
  • +
  • Headset. Low impedance transducers with microphone: 0x0402
  • +
  • Line in. High impedance input: 0x603
  • +
  • Line out. High impedance output: 0x604
  • +
  • Line in and Line out or Line in and Mic: + 0x400
  • +
+ +

Button functions

+

+The adapter shall convert button events received from the analog interface and +conforming to the Android +analog headset +specification to the following HID events:

+ + + + + + + + + + + + + + + + + + + + + +
FunctionMappings
AHID usage page: 0x0C
+ HID usage: 0x0CD
B HID usage page: 0x0C
+ HID usage: 0x0E9
CHID usage page: 0x0C
+ HID usage: 0x0EA
D HID usage page: 0x0C
+ HID usage: 0x0CF
+ + + + diff --git a/en/devices/accessories/headset/usb-device.html b/en/devices/accessories/headset/usb-device.html new file mode 100644 index 00000000..4cc73939 --- /dev/null +++ b/en/devices/accessories/headset/usb-device.html @@ -0,0 +1,124 @@ + + + USB Headset: Device Specification + + + + + + + + +

+For USB headsets to work seamlessly across the Android ecosystem, Android +devices must support them uniformly. This documentation specifies USB +behavior to support USB headsets and adapters across the Android ecosystem. +

+ +

Software mapping

+

+Compatible USB headsets are required to support compatible HID mappings. +Device support is required for the following keycode mappings. +

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
FunctionMappingsContextBehavior
AHID usage page: 0x0C
+ HID usage: 0x0CD
+ Kernel key: KEY_PLAYPAUSE
+ Android key: KEYCODE_MEDIA_PLAY_PAUSE
Media playbackInput: Short press
+ Output: Play or pause
Input: Long press
+ Output: Launch voice command
+ Sends: + android.speech.action.VOICE_SEARCH_HANDS_FREE if the device + is locked or its screen is off. Sends + android.speech.RecognizerIntent.ACTION_WEB_SEARCH otherwise
Incoming callInput: Short press
+ Output: Accept call
Input: Long press
+ Output: Reject call
Ongoing callInput: Short press
+ Output: End call
Input: Long press
+ Output: Mute or unmute microphone
BHID usage page: 0x0C
+ HID usage: 0x0E9
+ Kernel key: KEY_VOLUMEUP
+ Android key: VOLUME_UP
Media playback, Ongoing callInput: Short or long press
+ Output: Increases the system or headset volume
CHID usage page: 0x0C
+ HID usage: 0x0EA
+ Kernel key: KEY_VOLUMEDOWN
+ Android key: VOLUME_DOWN
Media playback, Ongoing callInput: Short or long press
+ Output: Decreases the system or headset volume
DHID usage page: 0x0C
+ HID usage: 0x0CF
+ Kernel key: KEY_VOICECOMMAND
+ Android key: KEYCODE_VOICE_ASSIST
All. Can be triggered in any instance.Input: Short or long press
+ Output: Launch voice command
+ +

Mechanical

+

+Device manufacturers should also consult the +USB Digital Audio page for more +information about USB implementation on Android. +Device manufacturers must also follow the requirements in the +USB section of +the Android CDD. +

+ + + diff --git a/en/devices/accessories/headset/usb-headset-spec.html b/en/devices/accessories/headset/usb-headset-spec.html index 3279eee1..9302fe09 100644 --- a/en/devices/accessories/headset/usb-headset-spec.html +++ b/en/devices/accessories/headset/usb-headset-spec.html @@ -24,25 +24,34 @@

-This documentation specifies USB headset buttons behavior to function uniformly -across the Android ecosystem. Device manufacturers should also consult the -USB -Digital Audio page for more information about USB implementation on Android -and the Android Compatibility -Definition Document (CDD) for requirements related to Android devices. -

-

There are also specifications for -3.5 mm headsets for accessory manufacturers and -3.5 mm jacks for device manufacturers. +This documentation specifies some characteristics of USB headsets, so that +they function uniformly across the Android ecosystem. Only headsets with +digital USB audio interface are permitted. Purely analog headsets with +mechanical adaptation to USB-C are not permitted, as per USB Type-C +specification.

This documentation specifies the minimum requirements: accessory manufacturers are encouraged to add features while keeping these requirements in mind.

-

Control-function mapping

+ +

Functional overview

+

+USB headsets can implement a variety of basic and advanced features. This +specification only covers mandated basic features: +

+
    +
  • Stereo output
  • +
  • Optional, but recommended, microphone
  • +
  • Function buttons for volume, playback, and call control
  • +
+ +

Control functions

+

Headsets can come with varying number of buttons to control specific +functions, such as volume and play/pause.

- + @@ -92,82 +101,34 @@ on a second key press).

Software mapping

Compatible USB headsets are required to support the following software mappings -for the headset buttons. Device support is required for the following software -mappings. +for the headset buttons. Devices match these HID mappings with the appropriate +Android keycode.

Control FunctionControl function Accessory Support Description
- - - - - - - - - - - - - - - - - - - - - - - + + - - - - + + - - - + - - - - + +
Function MappingsContextBehavior
AHID usage page: 0x0C
- HID usage: 0x0CD
- Kernel key: KEY_PLAYPAUSE
- Android key: KEYCODE_MEDIA_PLAY_PAUSE
Media playbackInput: Short press
- Output: Play or pause
Input: Long press
- Output: Launch voice command
- Sends: - android.speech.action.VOICE_SEARCH_HANDS_FREE if the device - is locked or its screen is off. Sends - android.speech.RecognizerIntent.ACTION_WEB_SEARCH otherwise
Incoming callInput: Short press
- Output: Accept call
Input: Long press
- Output: Reject call
Ongoing callInput: Short press
- Output: End call
Input: Long press
- Output: Mute or unmute microphone
AHID usage page: 0x0C
+ HID usage: 0x0CD
BHID usage page: 0x0C
- HID usage: 0x0E9
- Kernel key: KEY_VOLUMEUP
- Android key: VOLUME_UP
Media playback, Ongoing callInput: Short or long press
- Output: Increases the system or headset volume
B HID usage page: 0x0C
+ HID usage: 0x0E9
CHID usage page: 0x0C
- HID usage: 0x0EA
- Kernel key: KEY_VOLUMEDOWN
- Android key: VOLUME_DOWN
Media playback, Ongoing callInput: Short or long press
- Output: Decreases the system or headset volume
HID usage page: 0x0C
+ HID usage: 0x0EA
DHID usage page: 0x0C
- HID usage: 0x0CF
- Kernel key: KEY_VOICECOMMAND
- Android key: KEYCODE_VOICE_ASSIST
All. Can be triggered in any instance.Input: Short or long press
- Output: Launch voice command
D HID usage page: 0x0C
+ HID usage: 0x0CF
@@ -176,15 +137,16 @@ collection. For accessories without a microphone, use Headphone (Usage Page: Consumer (0x0C), Usage: Headphone (0x05)). For accesories with a microphone, use Headset (Usage Page: Telephony (0x0B), Usage: Headset (0x05)).

+

Output level

+

+The maximum sound pressure level shall comply to any regulatory requirement in +the country of destination. +

+

Mechanical

Accessory manufacturers must follow the requirements for USB connectors as specified by USB.org. -

-

-Device manufacturers must follow the requirements in the -USB section of -the Android CDD.

diff --git a/en/devices/tech/ota/index.html b/en/devices/tech/ota/index.html index 7b7db75f..1565e3b2 100644 --- a/en/devices/tech/ota/index.html +++ b/en/devices/tech/ota/index.html @@ -43,7 +43,7 @@ running but idle. A/B devices do not need space to download the update package because they can apply the update as they read it from the network. This is called streaming A/B. A/B updates are also - know as seamless updates. For more information about OTA + known as seamless updates. For more information about OTA updates for A/B devices, see A/B (Seamless) System Updates diff --git a/en/devices/tech/perf/boot-times.html b/en/devices/tech/perf/boot-times.html index e74ef1fc..a7588301 100644 --- a/en/devices/tech/perf/boot-times.html +++ b/en/devices/tech/perf/boot-times.html @@ -260,6 +260,12 @@ start init process, then delay those peripherals/components until later in the boot process.

+
+BoardConfig-common.mk:
+    BOARD_KERNEL_CMDLINE += initcall_debug ignore_loglevel
+
+

Optimizing I/O efficiency

diff --git a/en/security/bulletin/2018-02-01.html b/en/security/bulletin/2018-02-01.html index 2b479ed8..67509dfb 100644 --- a/en/security/bulletin/2018-02-01.html +++ b/en/security/bulletin/2018-02-01.html @@ -20,7 +20,7 @@ See the License for the specific language governing permissions and limitations under the License. --> -

Published February 5, 2018

+

Published February 5, 2018 | February 7, 2018

@@ -32,10 +32,9 @@ your Android version.

Android partners are notified of all issues at least a month before publication. -Source code patches for these issues will be released to the Android Open Source -Project (AOSP) repository in the next 48 hours. We will revise this bulletin -with the AOSP links when they are available. -

+Source code patches for these issues have been released to the Android Open +Source Project (AOSP) repository and linked from this bulletin. This bulletin +also includes links to patches outside of AOSP.

The most severe of these issues is a critical security vulnerability in Media framework that could enable a remote attacker using a specially crafted file to @@ -115,28 +114,34 @@ a privileged process.

CVE-2017-13228 - A-69478425 + + A-69478425 RCE Critical 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1 CVE-2017-13231 - A-67962232 + + A-67962232 + EoP High 8.0, 8.1 CVE-2017-13232 - A-68953950 + + A-68953950 + ID High 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1 CVE-2017-13230 - A-65483665 + + A-65483665 DoS High 7.0, 7.1.1, 7.1.2, 8.0, 8.1 @@ -148,14 +153,18 @@ a privileged process.

CVE-2017-13233 - A-62851602 + + A-62851602 + DoS High 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1 CVE-2017-13234 - A-68159767 + + A-68159767 + DoS High 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1 @@ -182,7 +191,10 @@ application to execute commands normally limited to privileged processes.

CVE-2017-13236 - A-68217699 + + A-68217699 + [2] + EoP Moderate 8.0, 8.1 @@ -342,11 +354,9 @@ a privileged process.

CVE-2017-15817 A-68992394
- -QC-CR#2076603 [2] [ -2] + +QC-CR#2076603 + [2] RCE Critical WLan @@ -354,11 +364,9 @@ href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan CVE-2017-17760 A-68992416
- -QC-CR#2082544 [2] [ -2] + +QC-CR#2082544 + [2] RCE Critical WLan @@ -382,8 +390,7 @@ href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan CVE-2017-17765 A-68992445
- + QC-CR#2115112 EoP High @@ -392,8 +399,7 @@ QC-CR#2115112 CVE-2017-17762 A-68992439
- + QC-CR#2114426 EoP High @@ -402,8 +408,7 @@ QC-CR#2114426 CVE-2017-14884 A-68992429
- + QC-CR#2113052 EoP High @@ -412,8 +417,7 @@ QC-CR#2113052 CVE-2017-15829 A-68992397
- + QC-CR#2097917 EoP High @@ -422,8 +426,7 @@ QC-CR#2097917 CVE-2017-15820 A-68992396
- + QC-CR#2093377 EoP High @@ -432,8 +435,7 @@ QC-CR#2093377 CVE-2017-17764 A-68992443
- + QC-CR#2114789 EoP High @@ -442,8 +444,7 @@ QC-CR#2114789 CVE-2017-17761 A-68992434
- + QC-CR#2114187 EoP High @@ -638,5 +639,10 @@ security bulletins. February 5, 2018 Bulletin published. + + 1.1 + February 7, 2018 + Bulletin revise to include AOSP links. + diff --git a/en/security/bulletin/_translation.yaml b/en/security/bulletin/_translation.yaml index 53f84959..88a35ea5 100644 --- a/en/security/bulletin/_translation.yaml +++ b/en/security/bulletin/_translation.yaml @@ -1,3 +1,36 @@ +ignore_paths: +- /security/bulletin/2017.html +- /security/bulletin/2017-12-01.html +- /security/bulletin/2017-11-01.html +- /security/bulletin/2017-10-01.html +- /security/bulletin/2017-09-01.html +- /security/bulletin/2017-08-01.html +- /security/bulletin/2017-07-01.html +- /security/bulletin/2017-06-01.html +- /security/bulletin/2017-05-01.html +- /security/bulletin/2017-04-01.html +- /security/bulletin/2017-03-01.html +- /security/bulletin/2017-02-01.html +- /security/bulletin/2017-01-01.html +- /security/bulletin/2016.html +- /security/bulletin/2016-12-01.html +- /security/bulletin/2016-11-01.html +- /security/bulletin/2016-10-01.html +- /security/bulletin/2016-09-01.html +- /security/bulletin/2016-08-01.html +- /security/bulletin/2016-07-01.html +- /security/bulletin/2016-06-01.html +- /security/bulletin/2016-05-01.html +- /security/bulletin/2016-04-02.html +- /security/bulletin/2016-03-01.html +- /security/bulletin/2016-02-01.html +- /security/bulletin/2016-01-01.html +- /security/bulletin/2015.html +- /security/bulletin/2015-12-01.html +- /security/bulletin/2015-11-01.html +- /security/bulletin/2015-10-01.html +- /security/bulletin/2015-09-01.html +- /security/bulletin/2015-08-01.html enable_continuous_translation: True title: Android Security Bulletins description: Translations for Android Security Bulletins diff --git a/en/security/bulletin/pixel/2018-02-01.html b/en/security/bulletin/pixel/2018-02-01.html index 695ffd4b..6ebbbb9e 100644 --- a/en/security/bulletin/pixel/2018-02-01.html +++ b/en/security/bulletin/pixel/2018-02-01.html @@ -22,7 +22,7 @@ --> -

Published February 5, 2018

+

Published February 5, 2018 | Updated February 7, 2018

The Pixel / Nexus Security Bulletin contains details of security @@ -80,14 +80,16 @@ additional references are linked to numbers following the bug ID. CVE-2017-13239 - A-66244132 + A-66244132* ID Moderate 8.0 CVE-2017-13240 - A-68694819 + + A-68694819 + ID Moderate 8.0, 8.1 @@ -112,14 +114,17 @@ additional references are linked to numbers following the bug ID. CVE-2017-13241 - A-69065651 + + A-69065651 + ID Moderate 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1 CVE-2017-13229 - A-68160703 + + A-68160703 RCE Moderate 7.0, 7.1.1, 7.1.2, 8.0, 8.1 @@ -131,7 +136,8 @@ additional references are linked to numbers following the bug ID. CVE-2017-13235 - A-68342866 + + A-68342866 NSI NSI 7.0, 7.1.1, 7.1.2, 8.0, 8.1 @@ -161,14 +167,17 @@ additional references are linked to numbers following the bug ID. CVE-2017-13242 - A-62672248 + + A-62672248 + [2] + ID Moderate 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1 CVE-2017-13243 - A-38258991 + A-38258991* ID Moderate 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0 @@ -208,8 +217,7 @@ additional references are linked to numbers following the bug ID. CVE-2017-1000405 A-69934280
- + Upstream kernel EoP Moderate @@ -243,8 +251,7 @@ Upstream kernel CVE-2017-15859 A-65468985
- + QC-CR#2059715 ID Moderate @@ -261,8 +268,7 @@ QC-CR#2059715 CVE-2017-9723 A-68992479
- + QC-CR#2007828 EoP Moderate @@ -271,10 +277,9 @@ QC-CR#2007828 CVE-2017-14881 A-68992478
- -QC-CR#2087492 [2] + +QC-CR#2087492 + [2] EoP Moderate ipa driver @@ -282,10 +287,9 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=1e14c7342 CVE-2017-14877 A-68992473
- -QC-CR#2057803 [2] + +QC-CR#2057803 + [2] EoP Moderate ipa driver @@ -293,10 +297,9 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c2fd287bf CVE-2017-15826 A-68992471
- -QC-CR#2100085 [2] + +QC-CR#2100085 + [2] EoP Moderate MDSS rotator @@ -304,8 +307,7 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=46db8f829 CVE-2017-14876 A-68992468
- + QC-CR#2054041 EoP Moderate @@ -314,8 +316,7 @@ QC-CR#2054041 CVE-2017-14892 A-68992455
- + QC-CR#2096407 EoP Moderate @@ -324,8 +325,7 @@ QC-CR#2096407 CVE-2017-17766 A-68992448
- + QC-CR#2115366 EoP Moderate @@ -334,8 +334,7 @@ QC-CR#2115366 CVE-2017-15823 A-68992447
- + QC-CR#2115365 EoP Moderate @@ -352,10 +351,9 @@ QC-CR#2115365 CVE-2017-15846 A-67713103
- -QC-CR#2083314 [2] + +QC-CR#2083314 + [2] EoP Moderate Camera @@ -363,8 +361,7 @@ href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9c18cc555 CVE-2017-14883 A-68992426
- + QC-CR#2112832 EoP Moderate @@ -373,8 +370,7 @@ QC-CR#2112832 CVE-2017-11043 A-68992421
- + QC-CR#2091584 EoP Moderate @@ -383,8 +379,7 @@ QC-CR#2091584 CVE-2017-14875 A-68992465
- + QC-CR#2042147 ID Moderate @@ -393,8 +388,7 @@ QC-CR#2042147 CVE-2017-14891 A-68992453
- + QC-CR#2096006 ID Moderate @@ -403,8 +397,7 @@ QC-CR#2096006 CVE-2017-17771 A-38196031
- + QC-CR#2003798 EoP Moderate @@ -467,7 +460,7 @@ and a summary of the issue. A-69349260 - App Compatibility + App compatibility Improved RSA key parsing from byte arrays. All @@ -479,7 +472,7 @@ and a summary of the issue. A-69797895 - Mobile Data + Mobile data Improved data performance for Telus users in certain network environments. Pixel 2 @@ -511,8 +504,8 @@ bulletin.

Security patch levels of 2018-02-05 or later address all issues associated with the 2018-02-05 security patch level and all previous patch levels. To learn how -to check a device's security patch level, read the instructions on the Pixel +to check a device's security patch level, read the instructions on the +Pixel and Nexus update schedule.

@@ -593,8 +586,8 @@ column mean?

Issues that are not publicly available have a * next to the Android bug ID in the References column. The update for that issue is generally contained -in the latest binary drivers for Nexus devices available from the Google Developer +in the latest binary drivers for Nexus devices available from the +Google Developer site.

@@ -622,6 +615,11 @@ bulletin, are not required for declaring a security patch level. February 5, 2018 Bulletin published. + + 1.1 + February 7, 2018 + Bulletin revised to include AOSP links. + diff --git a/en/security/selinux/device-policy.html b/en/security/selinux/device-policy.html index 928a1faa..adfd629e 100644 --- a/en/security/selinux/device-policy.html +++ b/en/security/selinux/device-policy.html @@ -240,7 +240,7 @@ windows open:

The intent is clear: everyone but third-party apps may have access to the debug device.

-

The rule is flawed in a few of ways. The exclusion of untrusted_app +

The rule is flawed in a few ways. The exclusion of untrusted_app is trivial to work around because all apps may optionally run services in the isolated_app domain. Likewise, if new domains for third-party apps are added to AOSP, they will also have access to scary_debug_device. -- cgit v1.2.3