| <html devsite><head> |
| <title>Pixel /Nexus 安全公告 - 2017 年 12 月</title> |
| <meta name="project_path" value="/_project.yaml"/> |
| <meta name="book_path" value="/_book.yaml"/> |
| </head> |
| <body> |
| <!-- |
| Copyright 2017 The Android Open Source Project |
| |
| Licensed under the Apache License, Version 2.0 (the "License"); |
| you may not use this file except in compliance with the License. |
| You may obtain a copy of the License at |
| |
| //www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, software |
| distributed under the License is distributed on an "AS IS" BASIS, |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| See the License for the specific language governing permissions and |
| limitations under the License. |
| --> |
| <p><em>发布时间:2017 年 12 月 4 日 | 更新时间:2017 年 12 月 6 日</em></p> |
| |
| <p> |
| 本 Pixel/Nexus 安全公告详细介绍了会影响<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">受支持的 Google Pixel 和 Nexus 设备</a>(Google 设备)的安全漏洞和功能改进。对于 Google 设备,如果安全补丁程序级别是 2017-12-05 或更新,则意味着已解决本公告中所述的所有问题。要了解如何查看设备的安全补丁程序级别,请参阅<a href="https://support.google.com/pixelphone/answer/4457705">查看并更新 Android 版本</a>。 |
| </p> |
| <p> |
| 所有受支持的 Google 设备都将会收到 2017-12-05 补丁程序级别的更新。我们建议所有用户都在自己的设备上接受这些更新。 |
| </p> |
| <p class="note"> |
| <strong>注意</strong>:可在 <a href="//developers.google.com/android/nexus/images">Google Developers 网站</a>上找到 Google 设备固件映像。 |
| </p> |
| <h2 id="announcements">通告</h2> |
| <p> |
| 除了 <a href="/security/bulletin/2017-12-01">2017 年 12 月的 Android 安全公告</a>中所述的安全漏洞外,Pixel 和 Nexus 设备中还包含针对下述安全漏洞的补丁程序。合作伙伴在至少一个月前就已收到关于这些问题的通知,并可以选择将针对这些问题的补丁程序纳入到其设备更新中。 |
| </p> |
| <h2 id="security-patches">安全补丁程序</h2> |
| <p> |
| 漏洞列在所影响的组件下,内容包括问题描述和一个表,该表中包含 CVE、相关参考内容、<a href="#type">漏洞类型</a>、<a href="/security/overview/updates-resources.html#severity">严重程度</a>和已更新的 Android 开源项目 (AOSP) 版本(如果适用)。如果有解决相应问题的公开更改记录(例如 AOSP 代码更改列表),我们会将 Bug ID 链接到该记录。如果某个 Bug 有多条相关的代码更改记录,我们还会通过 Bug ID 后面的数字链接到更多参考内容。 |
| </p> |
| |
| <h3 id="media-framework">媒体框架</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考内容</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>已更新的 AOSP 版本</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13154</td> |
| <td><a href="https://android.googlesource.com/platform/frameworks/av/+/271defe729a10db25b45759c8ccfb5abed24c647">A-63666573</a></td> |
| <td>EoP</td> |
| <td>高</td> |
| <td>5.1.1、6.0、6.0.1、7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-0879</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/frameworks/av/+/26a87d15ef97b35633577f7a97ed39bcaa800585">A-65025028</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>5.1.1、6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13149</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libhevc/+/4cf597a518436abf964b020bb97f97e490f80065">A-65719872</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>5.1.1、6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13150</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libmpeg2/+/86bfec8d3215dbdabbe79dba128628976ebfc6ef">A-38328132</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13152</td> |
| <td><a href="https://android.googlesource.com/platform/frameworks/av/+/b41a527176b659c5ddfc734838df7607a6af80c9">A-62872384</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>5.1.1、6.0、6.0.1、7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="broadcom-components">Broadcom 组件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考内容</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>组件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13161</td> |
| <td>A-63930471<a href="#asterisk">*</a><br />BC-V2017092501</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>未定义</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="kernel-components">内核组件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考内容</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>组件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13167</td> |
| <td>A-37240993<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>高</td> |
| <td>声音定时器</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13163</td> |
| <td>A-37429972<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>MTP USB 驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-15868</td> |
| <td>A-33982955<br /> |
| <a href="https://patchwork.kernel.org/patch/9882449/">上游内核</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>无线驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13165</td> |
| <td>A-31269937<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>文件系统</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13166</td> |
| <td>A-34624167<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>V4L2 视频驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-1000380</td> |
| <td>A-64217740<br /> |
| <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d11662f4f798b50d8c8743f433842c3e40fe3378">上游内核</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>声音定时器驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13168</td> |
| <td>A-65023233<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>SCSI 驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13169</td> |
| <td>A-37512375<a href="#asterisk">*</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>摄像头服务器</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13164</td> |
| <td>A-36007193<a href="#asterisk">*</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>Binder 驱动程序</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="mediatek-components">MediaTek 组件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考内容</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>组件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13172</td> |
| <td>A-36493287<a href="#asterisk">*</a><br />M-ALPS03495791</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>蓝牙驱动程序</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="nvidia-components">NVIDIA 组件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考内容</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>组件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-6280</td> |
| <td>A-63851980<a href="#asterisk">*</a><br />N-CVE-2017-6280</td> |
| <td>ID</td> |
| <td>中</td> |
| <td>NVIDIA 驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13175</td> |
| <td>A-64339309<a href="#asterisk">*</a><br />N-CVE-2017-13175</td> |
| <td>ID</td> |
| <td>中</td> |
| <td>Libwilhelm</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="qualcomm-components">Qualcomm 组件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考内容</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>组件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-9708</td> |
| <td>A-62674846<a href="#asterisk">*</a><br />QC-CR#2081806</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>内核</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11042</td> |
| <td>A-38232268<a href="#asterisk">*</a><br />QC-CR#2070438</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>Binder</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11030</td> |
| <td>A-64431967<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=89e6c2d38405cdeefaa278cbf6d18791f255ee5e">QC-CR#2034255</a> [<a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=2be7caec635de9fcf0d2145f858635e9366f0f4f">2</a>]</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>显示屏</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9703</td> |
| <td>A-34329758<a href="#asterisk">*</a><br />QC-CR#2038086</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>视频驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9718</td> |
| <td>A-36386076<a href="#asterisk">*</a><br />QC-CR#2045918</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>内核</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-8244</td> |
| <td>A-35138888<a href="#asterisk">*</a><br />QC-CR#2013361</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>Debugfs 驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14901</td> |
| <td>A-65468984<br /> |
| <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=e4f54acdc4e0d41530d0189e6c59301b8b900ba6">QC-CR#2059714</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9698</td> |
| <td>A-63868678<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=79492490423bc369da4ded113dca7f5a5b38e656">QC-CR#2023860</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>图形</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9700</td> |
| <td>A-63868780<br /> |
| <a href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=c2e5af21d3d3bb856ff3b5783aa2a6147a4c9089">QC-CR#2043822</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>音频</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9722</td> |
| <td>A-64453224<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=ab0ae43628cff92d10792b762667ddfaf243d796">QC-CR#2034239</a> [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=cd7e77fbab7e2b7e737a10d5300e826572fee82f">2</a>]</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>显示屏</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11049</td> |
| <td>A-64728945<br /> |
| <a href="https://www.codeaurora.org/gitweb/quic/la/?p=kernel/msm-3.18.git;a=commit;h=430f3805c82634a3cb969d83acc4fc4c0ee6af27">QC-CR#2034909</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>显示屏</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11047</td> |
| <td>A-64728948<br /> |
| <a href="https://www.codeaurora.org/gitweb/quic/la/?p=kernel/msm-4.4.git;a=commit;h=8d0b17fdbea77753ce4388e4b7538f1c32b2b730">QC-CR#2057285</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>显示屏</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14898</td> |
| <td>A-65468978<br /> |
| <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f4bc0d11aa35ffe5f58fdcb7e4bfeffa08011128">QC-CR#2054748</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14899</td> |
| <td>A-65468980<br /> |
| <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=424a72b2a924d32e6a777c93c5ccf8979c776d25">QC-CR#2054752</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11044</td> |
| <td>A-65468989<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=704512a933415f38c190d21e28bcd2dd122dc4b8">QC-CR#2063166</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>图形</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11045</td> |
| <td>A-65468993<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=6c815ebc37f49e4e3edb10def9c45f2fd9362a84">QC-CR#2060377</a> [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=2a657721dd71aec745534af9f8712537b83c410e">2</a>]</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>摄像头</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14900</td> |
| <td>A-65468983<br /> |
| <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=8a4da03089ec78d44e44efa594d08cecc177326e">QC-CR#2058468</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9710</td> |
| <td>A-63868933<br /> |
| <a href="https://www.codeaurora.org/gitweb/quic/la/?p=kernel/msm-4.4.git;a=commit;h=938946fef09130dfe6b8158bfebeb85a4c5c29e3">QC-CR#2023883</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>数据 HLOS</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11019</td> |
| <td>A-64453105<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=a2e451a1e1d973709ccd062c9aade669cd0daca4">QC-CR#2030638</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>显示屏</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11016</td> |
| <td>A-64453423<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=6bb0d13bbd9df966a9a2b801e5204937285413fe">QC-CR#2038685</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>音频</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11033</td> |
| <td>A-64453422<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=b54141365805ae1a5254bff5442e1a103d3701d0">QC-CR#2031930</a> [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=fd98387b3d30da51773ad7597bb9febb87c70394">2</a>]</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>内核</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14896</td> |
| <td>A-65468975<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=07c254f9c167b7114385a50abd29938db45d5052">QC-CR#2013716</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>GUD mobicore 驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-8281</td> |
| <td>A-62378232<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=9b209c4552779edb86221787fb8681dd212e3a0c">QC-CR#2015892</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>DCI 驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14903</td> |
| <td>A-63522505<a href="#asterisk">*</a><br />QC-CR#2088768</td> |
| <td>ID</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11031</td> |
| <td>A-64442463<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=70b104dcaf84f61b9ae37fde4d9fca69170cebe5">QC-CR#2059181</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>显示屏</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14905</td> |
| <td>A-37719782<br /> |
| <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4d9812973e8b12700afd8c3d6f36a94506ffb6fc">QC-CR#2061251</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>无线网络</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="qualcomm-closed-source-components">Qualcomm 闭源组件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考内容</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>组件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-14907</td> |
| <td>A-62212113<a href="#asterisk">*</a></td> |
| <td>N/A</td> |
| <td>严重</td> |
| <td>闭源组件</td> |
| </tr> |
| <tr> |
| <td>CVE-2016-5341</td> |
| <td>A-63983006<a href="#asterisk">*</a></td> |
| <td>N/A</td> |
| <td>中</td> |
| <td>闭源组件</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9709</td> |
| <td>A-65944335<a href="#asterisk">*</a></td> |
| <td>N/A</td> |
| <td>中</td> |
| <td>闭源组件</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-15813</td> |
| <td>A-63979947<a href="#asterisk">*</a></td> |
| <td>N/A</td> |
| <td>中</td> |
| <td>闭源组件</td> |
| </tr> |
| </tbody></table> |
| |
| <h2 id="functional-updates">功能更新</h2> |
| <p> |
| 在 12 月份的 OTA 更新期间,所有受支持的 Google 设备都将会收到 Android 8.1 更新。Android 8.1 中包含针对 Android 平台各个部分的多项功能更新和改进。 |
| </p> |
| |
| <h2 id="common-questions-and-answers">常见问题和解答</h2> |
| <p> |
| 这一部分解答了用户在阅读本公告后可能会提出的常见问题。 |
| </p> |
| <p> |
| <strong>1. 如何确定我的设备是否已通过更新解决这些问题? |
| </strong> |
| </p> |
| <p> |
| 如果安全补丁程序级别是 2017-12-05 或更新,则意味着已解决 2017-12-05 以及之前的所有安全补丁程序级别涵盖的所有问题。要了解如何查看设备的安全补丁程序级别,请参阅 <a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel 和 Nexus 更新时间表</a>中的说明。 |
| </p> |
| <p id="type"> |
| <strong>2.“类型”列中的条目表示什么意思?<em></em></strong> |
| </p> |
| <p> |
| 在漏洞详情表内,“类型”列中的条目是安全漏洞的分类。<em></em> |
| </p> |
| <table> |
| <colgroup><col width="25%" /> |
| <col width="75%" /> |
| </colgroup><tbody><tr> |
| <th>缩写词</th> |
| <th>定义</th> |
| </tr> |
| <tr> |
| <td>RCE</td> |
| <td>远程代码执行</td> |
| </tr> |
| <tr> |
| <td>EoP</td> |
| <td>提权</td> |
| </tr> |
| <tr> |
| <td>ID</td> |
| <td>信息披露</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>拒绝服务</td> |
| </tr> |
| <tr> |
| <td>N/A</td> |
| <td>没有分类</td> |
| </tr> |
| </tbody></table> |
| <p> |
| <strong>3.“参考内容”列中的条目表示什么意思?<em></em></strong> |
| </p> |
| <p> |
| 在漏洞详情表内,“参考内容”列中的条目可能包含用于标识参考值所属组织的前缀。<em></em> |
| </p> |
| <table> |
| <colgroup><col width="25%" /> |
| <col width="75%" /> |
| </colgroup><tbody><tr> |
| <th>前缀</th> |
| <th>参考内容</th> |
| </tr> |
| <tr> |
| <td>A-</td> |
| <td>Android Bug ID</td> |
| </tr> |
| <tr> |
| <td>QC-</td> |
| <td>Qualcomm 参考编号</td> |
| </tr> |
| <tr> |
| <td>M-</td> |
| <td>MediaTek 参考编号</td> |
| </tr> |
| <tr> |
| <td>N-</td> |
| <td>NVIDIA 参考编号</td> |
| </tr> |
| <tr> |
| <td>B-</td> |
| <td>Broadcom 参考编号</td> |
| </tr> |
| </tbody></table> |
| <p id="asterisk"> |
| <strong>4. 在“参考内容”列中,Android Bug ID 旁边的 * 表示什么意思?<em></em></strong> |
| </p> |
| <p> |
| 如果问题尚未公开发布,则在“参考内容”列中,相应 Android Bug ID 旁边会显示 *。<em></em><a href="https://developers.google.com/android/nexus/drivers">Google Developers 网站</a>上针对 Nexus 设备提供的最新二进制驱动程序中通常包含旨在解决相应问题的更新。 |
| </p> |
| <p> |
| <strong>5. 为什么要将安全漏洞拆分到本公告和 Android 安全公告中?</strong> |
| </p> |
| <p> |
| 要在 Android 设备上声明最新的安全补丁程序级别,必须修复 Android 安全公告中记录的安全漏洞。但在声明安全补丁程序级别时,并不是必须要修复其他安全漏洞(如本公告中记录的漏洞)。 |
| </p> |
| <h2 id="versions">版本</h2> |
| <table> |
| <colgroup><col width="25%" /> |
| <col width="25%" /> |
| <col width="50%" /> |
| </colgroup><tbody><tr> |
| <th>版本</th> |
| <th>日期</th> |
| <th>备注</th> |
| </tr> |
| <tr> |
| <td>1.0</td> |
| <td>2017 年 12 月 4 日</td> |
| <td>发布了本公告。</td> |
| </tr> |
| <tr> |
| <td>1.1</td> |
| <td>2017 年 12 月 5 日</td> |
| <td>在本公告中添加了指向固件映像的链接和关于功能更新的详细信息。</td> |
| </tr> |
| <tr> |
| <td>1.2</td> |
| <td>2017 年 12 月 6 日</td> |
| <td>在本公告中添加了 AOSP 链接。</td> |
| </tr> |
| </tbody></table> |
| |
| </body></html> |