| <html devsite><head> |
| <title>Pixel / Nexus 安全公告 - 2017 年 11 月</title> |
| <meta name="project_path" value="/_project.yaml"/> |
| <meta name="book_path" value="/_book.yaml"/> |
| </head> |
| <body> |
| <!-- |
| Copyright 2017 The Android Open Source Project |
| |
| Licensed under the Apache License, Version 2.0 (the "License"); |
| you may not use this file except in compliance with the License. |
| You may obtain a copy of the License at |
| |
| //www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, software |
| distributed under the License is distributed on an "AS IS" BASIS, |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| See the License for the specific language governing permissions and |
| limitations under the License. |
| --> |
| |
| <p><em>发布时间:2017 年 11 月 6 日 | 更新时间:2017 年 11 月 8 日</em></p> |
| <p> |
| Pixel/Nexus 安全公告详细介绍了会影响<a href="//support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">受支持的 Google Pixel 和 Nexus 设备</a>(Google 设备)的安全漏洞和功能改进。对于 Google 设备,2017-11-05(或之后)的安全补丁程序级别还解决了本公告中提及的所有问题。要了解如何检查设备的安全补丁程序级别,请参阅<a href="//support.google.com/pixelphone/answer/4457705">查看并更新 Android 版本</a>。 |
| </p> |
| <p> |
| 所有受支持的 Google 设备都会收到 2017-11-05 补丁程序级别的更新。我们建议所有用户都在自己的设备上接受这些更新。 |
| </p> |
| <p class="note"> |
| <strong>注意</strong>:Google 设备固件映像可在 <a href="//developers.google.com/android/nexus/images">Google Developers 网站</a>上找到。 |
| </p> |
| <h2 id="announcements">公告</h2> |
| <p> |
| 除了 <a href="/security/bulletin/2017-11-01">2017 年 11 月 Android 安全公告</a>中介绍的安全漏洞外,Pixel 和 Nexus 设备中还包含针对下面所述安全漏洞的补丁程序。合作伙伴在至少一个月前就已收到这些问题的相关通知,可以选择将这些问题的解决方案纳入设备更新中。 |
| </p> |
| <h2 id="security-patches">安全补丁程序</h2> |
| <p> |
| 漏洞列在受其影响的组件下,其中包括问题描述,以及一个包含 CVE、相关参考信息、<a href="#type">漏洞类型</a>、<a href="/security/overview/updates-resources.html#severity">严重程度</a>和已更新的 Android 开源项目 (AOSP) 版本(如果适用)的表格。在适用的情况下,我们会将 Bug ID 链接到解决相应问题的公开更改记录(如 AOSP 代码更改列表)。如果某个 Bug 有多条相关的更改记录,我们还将通过 Bug ID 后面的数字链接到更多参考信息。 |
| </p> |
| |
| <h3 id="framework">框架</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考信息</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>已更新的 AOSP 版本</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-0845</td> |
| <td><a href="https://android.googlesource.com/platform/frameworks/base/+/e5787fc13164856e39690e40e81d3d46839eea16">A-35028827</a></td> |
| <td>DoS</td> |
| <td>中</td> |
| <td>5.0.2、5.1.1、6.0、6.0.1、7.0、7.1.1、7.1.2</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="media-framework">媒体框架</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考信息</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>已更新的 AOSP 版本</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-0838</td> |
| <td><a href="https://android.googlesource.com/platform/frameworks/av/+/528c7dd7c2387ac634b23973d0c1120d0f3d7ee7">A-63522818</a></td> |
| <td>EoP</td> |
| <td>高</td> |
| <td>7.0、7.1.1、7.1.2</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-0852</td> |
| <td><a href="https://android.googlesource.com/platform/external/libhevc/+/5aee2541810f19aec67a1a9ea64973eb557aae9c">A-62815506</a></td> |
| <td>DoS</td> |
| <td>高</td> |
| <td>5.0.2、5.1.1、6.0</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-0847</td> |
| <td><a href="https://android.googlesource.com/platform/frameworks/av/+/d162b02aefa4d2039f377ba9a45d753cd84d75f6">A-65540999</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>8.0</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-0848</td> |
| <td><a href="https://android.googlesource.com/platform/frameworks/av/+/2bec2c3b1fd778b35f45ff4f8b385ff9208fe692">A-64477217</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>5.0.2、5.1.1、6.0、6.0.1、7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-0849</td> |
| <td><a href="https://android.googlesource.com/platform/external/libavc/+/aa11ab9fdbb63766703a6280f4fc778f2f2c91ed">A-62688399</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>6.0、6.0.1、7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-0850</td> |
| <td>A-64836941<a href="#asterisk">*</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-0851</td> |
| <td><a href="https://android.googlesource.com/platform/external/libhevc/+/8c5bb82f982e5949b3c2e3e0c80045cc5ff30ac8">A-35430570</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>5.0.2、5.1.1、6.0、6.0.1、7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-0853</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libmpeg2/+/dd89269aa283dd740fd16c6d7d3cf225b3623338">A-63121644</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-0854</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libmpeg2/+/8c0289c09cddd378cd9a321ccdb1c62e7b80f626">A-63873837</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-0857</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libavc/+/3eb692de916c3576a18990e3e4193fce93c016dc">A-65122447</a></td> |
| <td>NSI</td> |
| <td>NSI</td> |
| <td>7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-0858</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libavc/+/208c74d62a3e1039dc87818306e057877760fbaa">A-64836894</a></td> |
| <td>NSI</td> |
| <td>NSI</td> |
| <td>7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-0859</td> |
| <td rowspan="2">A-36075131<a href="#asterisk">*</a></td> |
| <td>NSI</td> |
| <td>NSI</td> |
| <td>7.0、7.1.1、7.1.2</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0、6.0.1</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="runtime">运行时</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考信息</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>已更新的 AOSP 版本</th> |
| </tr> |
| <tr> |
| <td>CVE-2016-2105</td> |
| <td>A-63710022<a href="#asterisk">*</a></td> |
| <td>RCE</td> |
| <td>中</td> |
| <td>5.0.2、5.1.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2016-2106</td> |
| <td>A-63709511<a href="#asterisk">*</a></td> |
| <td>RCE</td> |
| <td>中</td> |
| <td>5.0.2、5.1.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-3731</td> |
| <td>A-63710076<a href="#asterisk">*</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>5.0.2、5.1.1</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="system">系统</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考信息</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>已更新的 AOSP 版本</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-0860</td> |
| <td><a href="https://android.googlesource.com/platform/frameworks/native/+/5508ca2c191f8fdf29d8898890a58bf1a3a225b3">A-31097064</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>5.0.2、5.1.1、6.0、6.0.1、7.0、7.1.1、7.1.2</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="kernel-components">内核组件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考信息</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>组件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-6001</td> |
| <td>A-37901413<br /> |
| <a href="//android-review.googlesource.com/#/c/438399/">上游内核</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>核心内核</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-0861</td> |
| <td>A-36006981<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>音频驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-0862</td> |
| <td>A-36006779<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>内核</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11600</td> |
| <td>A-64257838<br /> |
| <a href="//git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git/commit/?id=7bab09631c2a303f87a7eb7e3d69e888673b9b7e"> |
| 上游内核</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>网络子系统</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-0863</td> |
| <td>A-37950620<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>视频驱动程序</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="mediatek-components">MediaTek 组件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考信息</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>组件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-0864</td> |
| <td>A-37277147<a href="#asterisk">*</a><br /> |
| M-ALPS03394571</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>IoCtl(闪光灯)</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-0865</td> |
| <td>A-65025090<a href="#asterisk">*</a><br /> |
| M-ALPS02973195</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>SoC 驱动程序</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="nvidia-components">NVIDIA 组件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考信息</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>组件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-0866</td> |
| <td>A-38415808<a href="#asterisk">*</a><br /> |
| N-CVE-2017-0866</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>直接渲染基础架构</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-6274</td> |
| <td>A-34705801<a href="#asterisk">*</a><br /> |
| N-CVE-2017-6274</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>热驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-6275</td> |
| <td>A-34702397<a href="#asterisk">*</a><br /> |
| N-CVE-2017-6275</td> |
| <td>ID</td> |
| <td>中</td> |
| <td>热驱动程序</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="qualcomm-components">Qualcomm 组件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>参考信息</th> |
| <th>类型</th> |
| <th>严重程度</th> |
| <th>组件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-11073</td> |
| <td>A-62084791<a href="#asterisk">*</a><br /> |
| QC-CR#2064767</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>网络子系统</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11035</td> |
| <td>A-64431968<br /> |
| <a href="//source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=c5060da3e741577578d66dfadb7922d853da6156"> |
| QC-CR#2055659</a> |
| [<a href="//source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=cc1896424ae7a346090f601bc69c6ca51d9c3e04">2</a>]</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11012</td> |
| <td>A-64455446<br /> |
| <a href="//source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=7d0e40d328fa092c36b9585516ed29fc6041be55"> |
| QC-CR#2054760</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11085</td> |
| <td>A-62952032<a href="#asterisk">*</a><br /> |
| QC-CR#2077909</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>音频</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11091</td> |
| <td>A-37478866<a href="#asterisk">*</a><br /> |
| QC-CR#2064235</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>视频驱动程序</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11026</td> |
| <td>A-64453104<br /> |
| <a href="//source.codeaurora.org/quic/la/kernel/lk/commit/?id=88af13428d72d980003d99dd1dd0894ec3799a3e">QC-CR#1021460</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>Linux 启动</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11038</td> |
| <td>A-35888677<a href="#asterisk">*</a><br /> |
| QC-CR#2034087</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>内存子系统</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11032</td> |
| <td>A-64431966<br /> |
| <a href="//source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=2720294757d0ad5294283c15dc837852f7b2329a"> |
| QC-CR#1051435</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>Linux 内核</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9719</td> |
| <td>A-64438726<br /> |
| <a href="//source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=a491499c3490999555b7ccf8ad1a7d6455625807"> |
| QC-CR#2042697</a> |
| [<a href="//source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=d815f54f15d765b5e0035a9d208d71567bcaace0">2</a>]</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>显示屏</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11024</td> |
| <td>A-64441352<br /> |
| <a href="//source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=f2a482422fefadfa0fa9b4146fc0e2b46ac04922"> |
| QC-CR#2031178</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>有线连接</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11025</td> |
| <td>A-64440043<br /> |
| <a href="//source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=95e72ae9281b77abc3ed0cc6a33c17b989241efa"> |
| QC-CR#2013494</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>音频</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11023</td> |
| <td>A-64434485<br /> |
| <a href="//source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=c36e61af0f770125d0061a8d988d0987cc8d116a"> |
| QC-CR#2029216</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>服务</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11029</td> |
| <td>A-64433362<br /> |
| <a href="//source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=86f0d207d478e1681f6711b46766cfb3c6a30fb5"> |
| QC-CR#2025367</a> |
| [<a href="//source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=74ab23917b82769644a3299da47b58e080aa63f2">2</a>]</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>相机</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11018</td> |
| <td>A-64441628<br /> |
| <a href="//source.codeaurora.org/quic/la/kernel/msm/commit/?id=1d718286c4c482502a2c4356cebef28aef2fb01f"> |
| QC-CR#897844</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>相机</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9721</td> |
| <td>A-64441353<br /> |
| <a href="//source.codeaurora.org/quic/la/kernel/lk/commit/?id=b40eb596bc96724a46bf00bfd9764e87775e7f1e"> |
| QC-CR#2039552</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>显示屏</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9702</td> |
| <td>A-36492827<a href="#asterisk">*</a><br /> |
| QC-CR#2037398</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>相机</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11089</td> |
| <td>A-36819059<a href="#asterisk">*</a><br /> |
| QC-CR#2055013</td> |
| <td>ID</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-8239</td> |
| <td>A-36251230<a href="#asterisk">*</a><br /> |
| QC-CR#1091603</td> |
| <td>ID</td> |
| <td>中</td> |
| <td>相机</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11090</td> |
| <td>A-36818836<a href="#asterisk">*</a><br /> |
| QC-CR#2061676</td> |
| <td>ID</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11093</td> |
| <td>A-37625232<a href="#asterisk">*</a><br /> |
| QC-CR#2077623</td> |
| <td>ID</td> |
| <td>中</td> |
| <td>HDMI</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-8279</td> |
| <td>A-62378962<br /> |
| <a href="//source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=f09aee50c2ee6b79d94cb42eafc82413968b15cb"> |
| QC-CR#2015227</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>服务</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9696</td> |
| <td>A-36232584<a href="#asterisk">*</a><br /> |
| QC-CR#2029867</td> |
| <td>ID</td> |
| <td>中</td> |
| <td>内核</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11058</td> |
| <td>A-37718081<br /> |
| <a href="//source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4d9812973e8b12700afd8c3d6f36a94506ffb6fc"> |
| QC-CR#2061251</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11022</td> |
| <td>A-64440918<br /> |
| <a href="//source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=1379bfb6c09ee2ad5969db45c27fb675602b4ed0">QC-CR#1086582</a> |
| [<a href="//source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f41e3dbc92d448d3d56cae5517e41a4bafafdf3f">2</a>]</td> |
| <td>ID</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9701</td> |
| <td>A-63868730<br /> |
| <a href="//source.codeaurora.org/quic/la//kernel/lk/commit/?id=60a6821ca7723f84067faba64fb883d94357df16"> |
| QC-CR#2038992</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>Linux 启动</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11027</td> |
| <td>A-64453534<br /> |
| <a href="//source.codeaurora.org/quic/la/kernel/lk/commit/?id=393e5d1cc9e216e1d37bf25be6c376b395882f29"> |
| QC-CR#2055630</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>Linux 启动</td> |
| </tr> |
| </tbody></table> |
| |
| <h2 id="functional-updates">功能更新</h2> |
| <p> |
| 针对受影响的 Pixel 设备纳入以下更新是为了解决与 Pixel 设备的安全性无关的功能问题。下表包含相关的参考信息、受影响的类别(例如蓝牙或移动数据)以及相关问题的摘要。 |
| </p> |
| <table> |
| <colgroup><col width="15%" /> |
| <col width="15%" /> |
| <col width="70%" /> |
| </colgroup><tbody><tr> |
| <th>参考信息</th> |
| <th>类别</th> |
| <th>改进</th> |
| </tr> |
| <tr> |
| <td>A-65225835</td> |
| <td>音频</td> |
| <td>在部分地区调整了音量警告阈值。</td> |
| </tr> |
| <tr> |
| <td>A-37943083</td> |
| <td>蓝牙</td> |
| <td>对仅支持 AVRCP 版本 1.3 的蓝牙设备进行了改进。</td> |
| </tr> |
| <tr> |
| <td>A-63790458</td> |
| <td>蓝牙</td> |
| <td>改进了耳机连接配对功能。</td> |
| </tr> |
| <tr> |
| <td>A-64142363</td> |
| <td>蓝牙</td> |
| <td>改进了部分蓝牙车载配件上的歌曲信息显示功能。</td> |
| </tr> |
| <tr> |
| <td>A-64991621</td> |
| <td>蓝牙</td> |
| <td>改进了部分车载配件中的元数据。</td> |
| </tr> |
| <tr> |
| <td>A-65223508</td> |
| <td>蓝牙</td> |
| <td>改进了与部分车载配件的蓝牙连接。</td> |
| </tr> |
| <tr> |
| <td>A-65463237</td> |
| <td>蓝牙</td> |
| <td>改进了 BLE 上的 Magic Tether。</td> |
| </tr> |
| <tr> |
| <td>A-64977836</td> |
| <td>相机</td> |
| <td>改进了视频拍摄过程中的自动对焦功能。</td> |
| </tr> |
| <tr> |
| <td>A-65099590</td> |
| <td>相机</td> |
| <td>改进了前置摄像头的响应速度。</td> |
| </tr> |
| <tr> |
| <td>A-68159303</td> |
| <td>显示屏</td> |
| <td>调整了显示屏颜色模式设置。</td> |
| </tr> |
| <tr> |
| <td>A-68254840</td> |
| <td>显示屏</td> |
| <td>调整了显示屏亮度设置。</td> |
| </tr> |
| <tr> |
| <td>A-68279369</td> |
| <td>显示屏</td> |
| <td>调整了导航栏的亮度。</td> |
| </tr> |
| <tr> |
| <td>A-64103722</td> |
| <td>移动数据</td> |
| <td>调整了 YouTube 从移动数据切换为 WLAN 的功能。</td> |
| </tr> |
| <tr> |
| <td>A-65113738</td> |
| <td>移动数据</td> |
| <td>针对 3 Network 进行了移动数据调整。</td> |
| </tr> |
| <tr> |
| <td>A-37187694</td> |
| <td>稳定性</td> |
| <td>提高了应用的稳定性。</td> |
| </tr> |
| <tr> |
| <td>A-67959484</td> |
| <td>稳定性</td> |
| <td>调整了通话质量。</td> |
| </tr> |
| </tbody></table> |
| |
| <h2 id="common-questions-and-answers">常见问题和解答</h2> |
| <p> |
| 这一部分解答了用户阅读本公告后可能会提出的常见问题。 |
| </p> |
| <p> |
| <strong>1. 如何确定我的设备是否已更新到解决了这些问题的版本? |
| </strong> |
| </p> |
| <p> |
| 2017-11-05(或之后)的安全补丁程序级别解决了与 2017-11-05 安全补丁程序级别以及之前的所有补丁程序级别相关的所有问题。要了解如何检查设备的安全补丁程序级别,请阅读 <a href="//support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel 和 Nexus 更新时间表</a>中的说明。 |
| </p> |
| <p id="type"> |
| <strong>2.“类型”列中的条目表示什么意思?<em></em></strong> |
| </p> |
| <p> |
| 漏洞详情表的“类型”列中的条目是安全漏洞的分类。<em></em> |
| </p> |
| <table> |
| <colgroup><col width="25%" /> |
| <col width="75%" /> |
| </colgroup><tbody><tr> |
| <th>缩写词</th> |
| <th>定义</th> |
| </tr> |
| <tr> |
| <td>RCE</td> |
| <td>远程代码执行</td> |
| </tr> |
| <tr> |
| <td>EoP</td> |
| <td>提权</td> |
| </tr> |
| <tr> |
| <td>ID</td> |
| <td>信息披露</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>拒绝服务</td> |
| </tr> |
| <tr> |
| <td>N/A</td> |
| <td>没有分类</td> |
| </tr> |
| </tbody></table> |
| <p> |
| <strong>3.“参考信息”列中的条目表示什么意思?<em></em></strong> |
| </p> |
| <p> |
| 漏洞详情表的“参考信息”列中的条目可能包含用于标识参考值所属组织的前缀。<em></em> |
| </p> |
| <table> |
| <colgroup><col width="25%" /> |
| <col width="75%" /> |
| </colgroup><tbody><tr> |
| <th>前缀</th> |
| <th>参考信息</th> |
| </tr> |
| <tr> |
| <td>A-</td> |
| <td>Android Bug ID</td> |
| </tr> |
| <tr> |
| <td>QC-</td> |
| <td>Qualcomm 参考编号</td> |
| </tr> |
| <tr> |
| <td>M-</td> |
| <td>MediaTek 参考编号</td> |
| </tr> |
| <tr> |
| <td>N-</td> |
| <td>NVIDIA 参考编号</td> |
| </tr> |
| <tr> |
| <td>B-</td> |
| <td>Broadcom 参考编号</td> |
| </tr> |
| </tbody></table> |
| <p id="asterisk"> |
| <strong>4.“参考信息”列中的“Android Bug ID”旁边的 * 表示什么意思?<em></em></strong> |
| </p> |
| <p> |
| 如果“参考信息”列的“Android Bug ID”旁边标有 *,则表示相应问题未公开发布。<em></em><a href="//developers.google.com/android/nexus/drivers">Google Developers 网站</a>上提供的 Nexus 设备的最新二进制驱动程序中通常包含针对此问题的更新。 |
| </p> |
| <p> |
| <strong>5. 为什么将安全漏洞分开公布在本公告和 Android 安全公告中?</strong> |
| </p> |
| <p> |
| Android 安全公告中记录的安全漏洞是在 Android 设备上采用最新的安全补丁程序级别所必不可少的。其他安全漏洞(如本公告中记录的漏洞)不是采用安全补丁程序级别所必需的。 |
| </p> |
| <h2 id="versions">版本</h2> |
| <table> |
| <colgroup><col width="25%" /> |
| <col width="25%" /> |
| <col width="50%" /> |
| </colgroup><tbody><tr> |
| <th>版本</th> |
| <th>日期</th> |
| <th>备注</th> |
| </tr> |
| <tr> |
| <td>1.0</td> |
| <td>2017 年 11 月 6 日</td> |
| <td>发布了本公告。</td> |
| </tr> |
| <tr> |
| <td>1.1</td> |
| <td>2017 年 11 月 8 日</td> |
| <td>更新了本公告,添加了 AOSP 链接和有关功能更新的更多详情。</td> |
| </tr> |
| </tbody></table> |
| |
| </body></html> |