Professional Documents
Culture Documents
Stark-L21A 9.0.1.132 (SP52C10E2R1P1) - Russia - Channel - Software Release Notes - Àó +-Á+ - Ú
Stark-L21A 9.0.1.132 (SP52C10E2R1P1) - Russia - Channel - Software Release Notes - Àó +-Á+ - Ú
STK-LX1 Secret
Commercial Name
Total 51 pages
Huawei P smart Z
HUAWEI
STK-LX1 9.0.1.132(SP52C10E2R1P1)
Release Notes
Revision record
Contents
1 Improvements.......................................................4
2 Known Issues.......................................................5
STK-LX1 9.0.1.132(SP52C10E2R1P1)
Release Notes
Version information description
This document gives an update on the STK-LX1 Software delivery details carried out by
Huawei team on STK-LX1 handset
CST 2019
Version type MR
1 Improvements
Bug ID Description
Implemented ARs
Priority
Bug ID Description
Level
DTS2019031405035 Yandex widget in the device is not the updated one
Minor
DTS2019030504051 Change the zoom resolution, the noise is large, the feedback is
Suggestion
5%, and the feedback sample is 0.32%.
The rear night mode mode takes pictures of AWB color cast, the
DTS2019030504024
Suggestion number of feedback accounts for 5%, and the feedback sample
DTS2019030503456
feedback is 16%, and the feedback sample is 2.65%.
Suggestion
DTS2019030409626
Minor Same scene brightness definition, noise instability
DTS2019022309183
Minor SAR
Priority
Bug ID Description
Level
NA
Defect
Module DTS ID Description
severity
NA
2 Known Issues
NA
Conference call
DTS201903111 drop in MTS and
2769 Minor Megafon.
If the table is excessively long, you can divide it into multiple ones
by product version, or deliver it in an excel file with patch release
notes and provide reference information in this section.]
Attention:
1. If the product uses the Qualcomm platform, it also incorporates the vulnerability and
adds the related vulnerability to the Release Notes. Notice: Added to the release notes if
product used Qualcomm platform and have already merged it.
2. If the product uses Broadcom wifi, it also incorporates this vulnerability and then adds
related vulnerabilities to the Release Notes.
Notice: Added to release notes if product used Broadcom wifi and have already merged it.
4. If the product uses the MediaTek platform, this vulnerability has also been incorporated
and the related vulnerability has been added to the Release Notes.
Notice: Added to release notes if product used MediaTek platform and have already
merged it.
exploitation.
needed. User
interaction is not
needed for
exploitation.
execution privileges
needed. User
interaction is not
needed for
exploitation.
remote escalation
of privilege with no
additional
execution privileges
needed. User
interaction is not
needed for
exploitation.
privileges, with no
additional
execution privileges
needed. User
interaction is not
needed for
exploitation.
disclosure with no
additional
privileges needed.
User interaction is
needed for
exploitation.
a missing bounds
check. This could
lead to local
information
disclosure with no
additional
execution privileges
needed. User
interaction is not
needed for
exploitation.
information
disclosure with no
additional
execution privileges
needed. User
interaction is not
needed for
exploitation.
Qua NA CVE
lco -
mm 201
clos 7-
ed- 180
sour 71
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 827
sour 4
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 46
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 28
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 359
sour 2
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 359
sour 1
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 180
sour 74
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 180
sour 73
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 25
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 827
sour 5
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 110
sour 11
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 37
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 34
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 36
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 40
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 35
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 42
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 38
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 39
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 29
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour
ce 32
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 33
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 180
sour 72
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 26
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 44
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 45
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 47
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 30
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 43
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 27
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 359
sour 0
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 359
sour 3
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 358
sour 9
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 359
sour 4
ce
com
pon
ents
exploitation. sps is
complete
ly parsed
to avoid
the
infinite
loop.
remote denial of
service with no
additional
execution privileges
needed. User
interaction is
needed for
exploitation.
remote denial of
service with no
additional
execution privileges
needed. User
interaction is
needed for
exploitation.
System execution
privileges needed.
User interaction is
not needed for
exploitation.
exploitation.
releasing the
debug_fs file
resource. This
could lead to
information
disclosure.
privilege. User
interaction is not
needed.
needed.
User interaction is
not needed for
exploitation.
System execution
privileges needed.
User interaction is
not needed for
exploitation.
exploitation. wma_wo
w_wakeu
p_host_e
vent.
EoP. signal to
it.
needed. User
interaction is not
needed for
exploitation.
System execution
privileges needed.
User interaction is
not needed for
exploitation.
exploitation.
needed for
exploitation.
execution privileges
needed. User
interaction is not
needed for
exploitation.
additional
execution privileges
needed. User
interaction is not
needed for
exploitation.
could lead to
remote escalation
of privilege with no
additional
execution privileges
needed. User
interaction is not
needed for
exploitation.
information overflow.
disclosure with no
additional
privileges needed.
User interaction is
needed for
exploitation.
mm 201 of cfgProcMsg.c, to
com 8- there is a possible validate
pon 356 out of bounds write a length
ents 6 due to a missing variable
bounds check. This to ensure
could lead to local it does
escalation of not
privilege with no exceed
additional CFG_MA
execution privileges X_STR_L
needed. User EN.
interaction is not
needed for
exploitation.
Qua NA CVE
lco -
mm 201
clos 7-
ed- 180
sour 71
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 827
sour 4
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 46
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 28
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 359
sour 2
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 359
sour 1
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 180
sour 74
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 180
sour 73
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 25
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 827
sour 5
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 110
sour 11
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 37
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 34
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 36
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 40
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 35
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 42
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 38
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 39
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 29
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour
ce 32
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 33
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 180
sour 72
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 26
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 44
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 45
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 47
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 30
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 43
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 7-
ed- 181
sour 27
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 359
sour 0
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 359
sour 3
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 358
sour 9
ce
com
pon
ents
Qua NA CVE
lco -
mm 201
clos 8-
ed- 359
sour 4
ce
com
pon
ents
exploitation. sps is
complete
ly parsed
to avoid
the
infinite
loop.
remote denial of
service with no
additional
execution privileges
needed. User
interaction is
needed for
exploitation.
remote denial of
service with no
additional
execution privileges
needed. User
interaction is
needed for
exploitation.
System execution
privileges needed.
User interaction is
not needed for
exploitation.
exploitation.
releasing the
debug_fs file
resource. This
could lead to
information
disclosure.
privilege. User
interaction is not
needed.
needed.
User interaction is
not needed for
exploitation.
System execution
privileges needed.
User interaction is
not needed for
exploitation.
exploitation. wma_wo
w_wakeu
p_host_e
vent.
EoP. signal to
it.
needed. User
interaction is not
needed for
exploitation.
System execution
privileges needed.
User interaction is
not needed for
exploitation.