TC55 Operating System BSP 02.65.00 APA GSM Non-GMS Worldwide Release Notes

Introduction

TC55 is a ruggedized device based on Android for the enterprise market that blends the capabilities of a smart phone with those of a traditional enterprise  PDA.

TC55 has a number of enterprise­grade features, including a touch­screen that can be used with gloves, support for stylus input for signatures, barcode capture capability and IP67 rating for dust and water protection.

It also features Zebra Extensions (MX) to make the Android operating system more enterprise ready, with security enhancements and hooks for device management tools, and is designed for a longer lifecycle than the typical smart phone.

TC55 is designed in response to customer feedback from using consumer­grade smart phones in the workplace, especially with the bring­your­own­device (BYOD) trend, where employees use their own choice of device for work.

With TC55 the workers can capture practically any type of data — from bar codes and signatures to photos, videos and NFC — improving on the job efficiency and customer service. The screen is optimized for Enterprise viewing, helping ensure the battery lasts a full  shift.

And with a drop, tumble and environmental sealing specification you can count on, it has the durability required to serve your field workers for  years.

This SW release contains TC55 Android KitKat Rebranded SW version offering new advanced features, increasing operation performance for the customer  satisfaction.

New Features in this Release

APA Features for TC55 KK:

1.        Zebra Volume Control (ZVC) is an APA directive to standardize volume control for all Android products (KitKat and newer). ZVC replaces the default Android volume control which is accessible from Settings­

>Audio­>Volume. When working in conjunction with AudioVolUIMgr CSP, ZVC also provides a means for our customers’ IT administrator to put upper and lower limits on the volume sliders to prevent users from changing volume to the lowest or highest  settings.

2.        Extended Battery Information APA feature adds to and standardizes battery information presented to user in “Battery Information” UI. Information will include the critical parameters of the   battery.

3.        NONSD CARD STORAGE PATHS: Way to define and enforce a standard that ensures that the experiences of using these built­in areas, that are transient (e.g. /data) and persistent (e.g. /enterprise) and the folders within them are as similar as possible across devices for device users, application developers, and device   administrators.

4.       APA DHCP options: Gives the user a way to configure various DHCP options via   CSP

5.       APA OTA packaging: User will have the option to upgrade and downgrade between BSPs with incremental/rollback packages.

Persistence feature: Whole enterprise folder is persisted across upgrade from JB to KK customers. Persistence of User configuration is supported via MDM  only.

SPR Fixes:

28385 ­ Customer needs a solution to change the device hostname. Port of   SPR#26191

28007 ­ JB to KK upgrade 02.52 Stagenow / MX not working an Factory Reset currently not detailed in RN is needed to get everything working

28182 ­ TC55/v2.52 StageNow Config will cause MX framework to fail, only resolvable with factory reset.

28374 ­ TC55 KK + EHS: NFC does not work after a reboot, screen lock/unlock sequence needed to restore NFC functionality

27835 ­ DataWedge GS1 Security Level ­ Invalid setting, and un­settable setting

28334 ­ TC55KK NFC Tags not reading in application, worked in JB Builds

27587 ­ TC55 DNS not accessible over VPN ­ following of   SPR#27543

28504 ­ EHS interfere with scan key  setting

Security Patch Info:

CVEs

Comment

CVE­2015­3829

Integer overflow in libstagefright processing MPEG4 covr atoms when chunk_data_size is SIZE_MAX.

CVE­2015­3827

Integer underflow in libstagefright when processing MPEG4 covr   atoms.

CVE­2015­3824

Integer overflow in libstagefright when parsing the MPEG4 tx3g   atom.

CVE­2014­8610

Externally Reported Low Severity Security Vulnerability: SMS Resend Vulnerability in Android.

CVE­2014­8609

SECURITY: Don't pass a usable Pending Intent to 3rd  parties.

CVE­2014­8507

Externally Reported Moderate Security Issue: SQL Injection in   WAPPushManager.

CVE­2014­7911

Add additional checks in  ObjectInputStream.

CVE­2015­3873

 

 

 

 

 

 

 

Vulnerabilities in libstagefright Could Allow Remote Code  Execution

CVE­2015­3872

CVE­2015­3871

CVE­2015­3868

CVE­2015­3867

CVE­2015­3869

CVE­2015­3870

CVE­2015­3823

CVE­2015­6598

CVE­2015­6599

CVE­2015­6600

CVE­2015­6603

CVE­2015­6601

CVE­2015­3876

CVE­2015­6604

CVE­2015­3874

Vulnerabilities in Sonivox Could Allow Remote Code  Execution

CVE­2015­3875

Vulnerabilities in libutils Could Allow Remote Code  Execution

CVE­2015­6602

CVE­2015­3877

Remote Code Execution Vulnerability in  Skia

 

CVE­2015­6608

The patch includes additional checks to validate word  length.

The patch includes additional checks to properly fail memory allocations and verify the size value used to allocate the memory that is read from a  file.

CVE­2015­6609

Remote Code Execution Vulnerability in  libutils

CVE­2015­1538

Integer overflows during MP4 atom  processing

CVE­2015­1539

An integer underflow in ESDS  processing

SPR28147­ StageFright Security Patch/ Android OS Vulnerable to Text   Hack

CVE­2015­0973

Vulnerability in libpng: Overflow in  png_Read_IDAT_data

 

SIGSEGV in jmem­ashmem could cause remote code  execution

CVE­2015­1536

Vulnerability in Bitmap unmarshalling

CVE­2015­3824

Integer overflow in libstagefright when parsing the MPEG4 tx3g   atom

CVE­2015­3826

Unbounded buffer read in libstagefright while parsing 3GPP metadata allows reading arbitrary memory

CVE­2015­3827

Integer underflow in libstagefright when processing MPEG4 covr   atoms

CVE­2014­6041

Multiple integer overflows in libstagefright  SampleTable

CVE­2014­6041

MediaFocusControl builds PendingIntent using its own uid and can send broadcast to any component.

CVE­2014­6041

Execute arbitrary code as any uid >= 1000 from adb  shell

CVE­2014­6041

ArrayMap append() method can create duplicate entries in Bundle   objects

CVE­2014­6041

Memory corruption in libskia

CVE­2014­6041

Buffer overflow in libskia

CVE­2014­6041

Settings app allows sending protected  broadcasts

CVE­2014­6041

sqlite race conditions leads to world­readable  permissions

CVE­2014­0972

Unprivileged GPU command streams can change the IOMMU page   table

CVE­2013­6282

Missing access checks in put_user/get_user kernel  API

CVE­2015­3636

SPR28252 ­ Use­after­free vulnerability in kernel handling of ping   sockets

Description

1.  Android KitKat  4.4.3

2.  Kernel 3.4.0

3.  DataWedge v 3.1.29

4.  Scanning Framework v5.46.0 5. MX.v4.4.4

6.  WLAN FUSION_QA_1.02.0.0.028

7. RIL 1.0.10

8. Modem 20015326.48

9. MSP v07.08.85

10. SOTI client v12.1.0 Build  23469

11. StageNow v 2.1.1.1425

12. SimulScan v1.11.1

13. EMDK 3.1.38

Contents

1.                  T55N0KXXVRUEN265.zip – TC55 KK Non­GMS OS Recovery Update   package

2.                  ETSIT55N0KRUEN265.zip ­ TC55 KK Non­GMS ETSI OS Recovery Update package for JB customers migrating to KK. This will preserve the Enterprise Partition & ETSI WLAN Power   table

3.                  FCCT55N0KRUEN265.zip ­ TC55 KK Non­GMS FCC OS Recovery Update package for JB customers migrating to KK. This will preserve the Enterprise Partition & FCC WLAN Power   table

4.                  T55N0KXXVREEN265.zip – TC55 KK Non­GMS Enterprise Recovery reset   package

5.                  T55N0KXXVRFEN265.zip – TC55 KK Non­GMS Factory Recovery reset   package

6.                  T55N0KXXVAUEN265.apf – TC55 KK Non­GMS OS Airbeam package for MSP   deployment

7.                  ETSIT55N0KAUEN265.apf ­ TC55 KK Non­GMS ETSI OS Airbeam package for MSP   deployment

8.                  FCCT55N0KAUEN265.apf ­ TC55 KK Non­GMS FCC OS Airbeam package for MSP   deployment

9.                  T55N0KXXVAEEN265.apf – TC55 KK Non­GMS Airbeam package for Enterprise   reset

10.              T55N0KXXVAFEN265.apf – TC55 KK Non­GMS Airbeam package for Factory   reset

Device Compatibility

This software release has been approved for use with the following devices SKUs supported:

TC55AH­KC11ES­ET

TC55AH­KC11EE­ET

TC55AH­KJ11ES­ET

TC55AH­KJ11EE­ET

TC55AH­K011ES­ET

TC55AH­K011EE­ET

TC55BH­K011EE­TW

TC55BH­K011ES­TW

TC55BH­KC11EE­TW

TC55BH­KC11ES­TW

TC55BH­KJ11EE­TW

TC55BH­KJ11ES­TW

TC55AH­KJ11ES

TC55AH­KJ11EE

TC55AH­KJ11ES­BL

TC55AH­KJ11EE­BL

TC55BH­KJ11ES

TC55BH­KJ11EE

TC55BH­KJ11ES­NS

TC55BH­KJ11EE­NS

TC55BH­KJ11JS­NS

TC55BH­KJ11JE­NS

TC55BH­KC11ES­NS

TC55BH­KC11EE­NS

TC55BH­K011ES­NS

TC55BH­K011EE­NS

TC55BH­K011EE

TC55BH­K011ES

TC55BH­KC11ES

TC55BH­KC11EE

TC55AH­KC11ES

TC55AH­KC11EE

TC55AH­KC11ES­BL

TC55AH­KC11EE­BL

TC55AH­K011ES

TC55AH­K011EE

TC55AH­K011ES­BL

TC55AH­K011EE­BL

TC55BH­KC11JS­NS

TC55BH­KC11JE­NS

TC55BH­KJ11KS­NS

TC55BH­KJ11KE­NS

TC55BH­K011KS­NS

TC55BH­K011KE­NS

TC55BH­KC11KS­NS

TC55BH­KC11KE­NS

TC55BH­KJ11MS­NS

TC55BH­KJ11ME­NS

TC55BH­K011CS­NS

TC55BH­K011CE­NS

TC55BH­K011MS­NS

TC55BH­K011ME­NS

TC55BH­KJ11CS­NS

TC55BH­KJ11CE­NS

TC55BH­KC11CS­NS

TC55BH­KC11CE­NS

TC55BH­KC11MS­NS

TC55BH­KC11ME­NS

And all TC55AH /TC55BH Jellybean SKUs. TC55 JB GMS terminals can be upgraded to KK GMS only. Reason: Customers who have GMS can only upgrade to GMS as devices are sold ( SKU ) based upon GMS/NON GMS

 

Installation Requirements

This SW is intended for the TC55AH and TC55BH  devices

Installation Instructions

For upgrading from older version of  KK

1.  T55N0KXXVRUEN265.zip – TC55 KK Non­GMS OS Recovery Update   package

  • Connect the USB cable from your PC to the device and enable USB mass storage mode on the device.
  • On your PC you should see an internal and SD card (if SD card is present) appears in the File Explorer and copy the recovery update zip file to any  storage.
  • Press and hold on the device the Power button, Scan/Action button and Vol+ until the screen is turned OFF
  • Release the Power and Scan/Action buttons and continue to hold Vol+ button The device should enter to Recovery update  mode
  • Release Vol+.
  • Click on Vol+ or Vol­ to navigate and select appropriated storage
  • Click on on Scan/Action button to select the  option
  • Click on Vol+ or Vol­ to navigate to the recovery update zip file 
  • Click on on Scan/Action button to select the recovery update zip file
  • Reboot the device

2.  T55N0KXXVRFEN265.zip – TC55 KK Non­GMS Factory Reset recovery package – Use only if you want to wipe Data and Enterprise  partition

3.  WLAN Region file Recovery update per Country Region – see the table below (not required for TC55 KitKat devices out of factory)

To Upgrade from JB to KK: 

ETSI customers should use: ETSIT55N0KRUEN265.zip

FCC customers should use:  FCCT55N0KRUEN265.zip

Country Group (Region)

Country Codes

WLAN Region File

 
 

USA,

US,

TC55KKFCCWLNV07.zip

 

Canada,

CA,

 

Puerto Rico,

PR,

 

American Virgin Island,

VI,

 

Anguilla,

AI,

 

Cayman Islands,

KY,

 

Guam,

GU,

 

Mariana Islands,

MP,

 

Dutch Antilles,

AN,

 

Curacao,

CW,

 

Bonaire, Saint Eustatius and Saba,

BQ,

 

St Maarten,

SX,

 

Taiwan,

TW,

 

Europe

AT, BE, BG, CY, CZ, DK, EE, FI, FR, DE, GR, HU, IS, IE, IT, LV, LI, LT, LU, MT, NL, NO, PL, PT, RO, SK, SI, ES, SE, CH, GB

TC55KKETSIWLNV07.zip

 

(w/ France)

 

 

South Africa,

ZA,

 

United Arab Emirates,

AE,

 

Saudi Arabia,

SA,

 

Turkey,

TR,

 

Falkland Islands,

FK,

 

French Guiana,

GF,

 

Guadeloupe,

GP,

 

Martinique,

MQ,

 

Belarus,

BY,

 

Macedonia

MK,

 

Montenegro,

ME,

 

Serbia,

RS,

 

Croatia,

HR,

 

Japan,

JP,

 

Australia,

AU,

 

New Zealand,

NZ,

 

Christmas Island,

CX,

 

Niue Island,

NU,

 

Norfolk Island,

NF,

 

Russia,

RU,

 

Nicaragua,

NI,

 

Paraguay,

PY,

 

Peru,

PE,

 

Philippines,

PH,

 

Thailand,

TH,

 

Trinidad&Tobago,

TT,

 

Uruguay,

UY,

 

Kazakhstan,

KZ,

 

Argentina,

AR,

 

Brazil,

BR,

 

Colombia,

CO,

 

Costa Rica,

CR,

 

Dominican Republic,

DO,

 

El Salvador,

SV,

 

Ecuador,

EC,

 

Hong Kong,

HK,

 

Sri Lanka,

LK,

 

Singapore,

SG,

 

Chile,

CL,

 

India,

IN,

 

Mexico,

MX,

 

Venezuela,

VE,

 

Barbados,

BB,

 

Panama,

PA,

 

China

CN,

 

Lebanon,

LB,

 

Malaysia,

MY,

 

Ukraine,

UA,

 

Israel,

IL,

 

Tunisia,

TN ,

 

Egypt,

EG,

 

Morocco,

MA,

 

South Korea,

KR,

 

Vietnam,

VN,

 

Indonesia,

ID,

 

Bolivia,

BO,

 

British Virgin Islands,

VG,

 

Guyana,

GY,

 

Guatemala,

GT,

 

Honduras,

HN,

 

Jamaica,

JM,

 

Algeria,

DZ,

 

Nigeria,

NG,

 

Kenya,

KE,

 

Pakistan,

PK,

 

4.  MSP OS package update

Please refer Mobility Service Platform deployment guide for instruction for the deployment of the following files:

1.     TC55 KK Non­GMS OS Airbeam  package

2.     TC55 KK Non­GMS Airbeam package for Enterprise  reset

3.     TC55 KK Non­GMS Airbeam package for Factory  reset

Notes

a.     Please note that only Enterprise partition and WLAN power table will be restored for JB to KK customers if ETSI or FCC package is used. All other settings of the device can be persisted only via MDM

b.     Visual Voice Mail (VVM) is not supported for all  carriers.

c.      Enterprise Enabler is not needed for TC55 KK  OS.

d.     Once upgraded to KK, downgrade to JB is not  supported.

Part Number and Release Date

1.     T55N0KXXVRUEN265.zip

2.     ETSIT55N0KRUEN265.zip

3.     FCCT55N0KRUEN265.zip

4.     T55N0KXXVRFEN265.zip

5.     T55N0KXXVREEN265.zip

6.     T55N0KXXVAUEN265.apf

7.     ETSIT55N0KAUEN265.apf

8.     FCCT55N0KAUEN265.apf

9.     T55N0KXXVAFEN265.apf

10.  T55N0KXXVAEEN265.apf

April, 2016