| <html devsite><head> |
| <title>Pixel / Nexus 安全性公告 - 2018 年 1 月</title> |
| <meta name="project_path" value="/_project.yaml"/> |
| <meta name="book_path" value="/_book.yaml"/> |
| </head> |
| <body> |
| <!-- |
| Copyright 2018 The Android Open Source Project |
| |
| Licensed under the Apache License, Version 2.0 (the "License"); |
| you may not use this file except in compliance with the License. |
| You may obtain a copy of the License at |
| |
| //www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, software |
| distributed under the License is distributed on an "AS IS" BASIS, |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| See the License for the specific language governing permissions and |
| limitations under the License. |
| --> |
| <p><em>發佈日期:2018 年 1 月 2 日 | 更新日期:2018 年 1 月 29 日</em></p> |
| |
| <p> |
| Pixel/Nexus 安全性公告羅列了會對<a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">支援的 Google Pixel 和 Nexus 裝置</a> (Google 裝置) 造成影響的安全性漏洞和功能改善項目,並說明各項相關細節。2018-01-05 之後的安全性修補程式等級也已針對 Google 裝置解決了 <a href="/security/bulletin/2018-01-01">2018 年 1 月 Android 安全性公告</a>列出的所有問題。請參閱<a href="https://support.google.com/pixelphone/answer/4457705">檢查及更新 Android 版本</a>一文,瞭解如何查看裝置的安全性修補程式等級。 |
| </p> |
| <p> |
| 所有支援的 Google 裝置都會收到 2018-01-05 修補程式等級更新。我們建議所有客戶接受這些裝置更新。 |
| </p> |
| <p class="note"> |
| <strong>注意:</strong>您可以前往 <a href="https://developers.google.com/android/nexus/images">Google Developers 網站</a>取得 Google 裝置韌體映像檔。 |
| </p> |
| <h2 id="announcements">公告事項</h2> |
| <p>我們除了修補 <a href="/security/bulletin/2018-01-01">2018 年 1 月 Android 安全性公告</a>中所列出的安全性漏洞,也針對下文列出的 Pixel 和 Nexus 裝置的安全性漏洞提供修補程式。我們的合作夥伴在至少一個月之前已收到所述問題的相關通知,方便他們將相關內容納入其裝置更新中。 |
| </p> |
| <h2 id="security-patches">安全性修補程式</h2> |
| <p> |
| 我們依照資安問題本身所影響的元件將各項漏洞分門別類,另外也附上了問題說明和一份 CVE 資訊表,其中包括了相關參考資料、<a href="#type">漏洞類型</a>、<a href="/security/overview/updates-resources.html#severity">嚴重程度</a>,以及更新的 Android 開放原始碼計劃 (AOSP) 版本 (在適用情況下)。假如相關錯誤有公開變更,該錯誤 ID 會連結到相對應的變更 (例如 Android 開放原始碼計劃變更清單)。如果單一錯誤有多項相關變更,您可以透過該錯誤 ID 後面的編號連結開啟額外的參考資料。</p> |
| |
| <h3 id="framework">架構</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>參考資料</th> |
| <th>類型</th> |
| <th>嚴重程度</th> |
| <th>更新的 Android 開放原始碼計劃版本</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-0846</td> |
| <td><a href="https://android.googlesource.com/platform/frameworks/base/+/93d77b07c34077b6c403c459b7bb75933446a502">A-64934810</a> |
| [<a href="https://android.googlesource.com/platform/frameworks/base/+/395e162a0bf21c7e67923b9ae5fc9aded2d128a7">2</a>] |
| </td> |
| <td>ID</td> |
| <td>中</td> |
| <td>5.1.1、6.0、6.0.1、7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="media-framework">媒體架構</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>參考資料</th> |
| <th>類型</th> |
| <th>嚴重程度</th> |
| <th>更新的 Android 開放原始碼計劃版本</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13201</td> |
| <td><a href="https://android.googlesource.com/platform/frameworks/av/+/7f7783d0c0c726eaaf517125383b0fb30251bdd0">A-63982768</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>5.1.1、6.0、6.0.1、7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13202</td> |
| <td><a href="https://android.googlesource.com/platform/frameworks/av/+/de7f50ee76ed5ed70d9174f23175287c1035b383">A-67647856</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>5.1.1、6.0、6.0.1、7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13206</td> |
| <td><a href="https://android.googlesource.com/platform/external/aac/+/29189063770fbd7d00f04ed1fd16ec5eefee7ec9">A-65025048</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>5.1.1、6.0、6.0.1、7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13207</td> |
| <td><a href="http://lesource.com/platform/frameworks/av/+/212335cbc6e8795c3cfb332e7b119e03cf33f603">A-37564426</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13185</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libhevc/+/2b9fb0c2074d370a254b35e2489de2d94943578d">A-65123471</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>5.1.1、6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13187</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libhevc/+/7c9be319a279654e55a6d757265f88c61a16a4d5">A-65034175</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>5.1.1、6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13188</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/aac/+/8e3be529372892e20ccf196809bc73276c822189">A-65280786</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>5.1.1、6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13203</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libavc/+/e86d3cfd2bc28dac421092106751e5638d54a848">A-63122634</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13204</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libavc/+/42cf02965b11c397dd37a0063e683cef005bc0ae">A-64380237</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13205</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libmpeg2/+/29a78a11844fc027fa44be7f8bd8dc1cf8bf89f6">A-64550583</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13200</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/frameworks/av/+/dd3ca4d6b81a9ae2ddf358b7b93d2f8c010921f5">A-63100526</a></td> |
| <td>ID</td> |
| <td>低</td> |
| <td>7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>ID</td> |
| <td>中</td> |
| <td>5.1.1、6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13186</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libavc/+/6c327afb263837bc90760c55c6605b26161a4eb9">A-65735716</a></td> |
| <td>NSI</td> |
| <td>NSI</td> |
| <td>7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13189</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libavc/+/5acaa6fc86c73a750e5f4900c4e2d44bf22f683a">A-68300072</a></td> |
| <td>NSI</td> |
| <td>NSI</td> |
| <td>7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13190</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libhevc/+/3ed3c6b79a7b9a60c475dd4936ad57b0b92fd600">A-68299873</a></td> |
| <td>NSI</td> |
| <td>NSI</td> |
| <td>7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13194</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/external/libvpx/+/55cd1dd7c8d0a3de907d22e0f12718733f4e41d9">A-64710201</a></td> |
| <td>NSI</td> |
| <td>NSI</td> |
| <td>7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>5.1.1、6.0、6.0.1</td> |
| </tr> |
| <tr> |
| <td rowspan="2">CVE-2017-13198</td> |
| <td rowspan="2"><a href="https://android.googlesource.com/platform/frameworks/ex/+/ede8f95361dcbf9757aaf6d25ce59fa3767344e3">A-68399117</a></td> |
| <td>NSI</td> |
| <td>NSI</td> |
| <td>7.0、7.1.1、7.1.2、8.0、8.1</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>高</td> |
| <td>5.1.1、6.0、6.0.1</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="system">系統</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>參考資料</th> |
| <th>類型</th> |
| <th>嚴重程度</th> |
| <th>更新的 Android 開放原始碼計劃版本</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13212</td> |
| <td><a href="https://android.googlesource.com/platform/frameworks/base/+/e012d705dd8172048c3f32113b2a671847e3d1a2"> |
| A-62187985</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>5.1.1、6.0、6.0.1、7.0、7.1.1、7.1.2、8.0</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="broadcom-components">Broadcom 元件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>參考資料</th> |
| <th>類型</th> |
| <th>嚴重程度</th> |
| <th>元件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13213</td> |
| <td>A-63374465<a href="#asterisk">*</a><br /> |
| B-V2017081501</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>Bcmdhd 驅動程式</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="htc-components">HTC 元件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>參考資料</th> |
| <th>類型</th> |
| <th>嚴重程度</th> |
| <th>元件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-11072</td> |
| <td>A-65468991<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>分區表更新程式</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="kernel-components">核心元件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>參考資料</th> |
| <th>類型</th> |
| <th>嚴重程度</th> |
| <th>元件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13219</td> |
| <td>A-62800865<a href="#asterisk">*</a></td> |
| <td>DoS</td> |
| <td>中</td> |
| <td>Synaptics 觸控螢幕控制器</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13220</td> |
| <td>A-63527053<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>BlueZ</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13221</td> |
| <td>A-64709938<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>Wi-Fi 驅動程式</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11473</td> |
| <td>A-64253928<br /> |
| <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4"> |
| 上游程式庫核心</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>核心</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13222</td> |
| <td>A-38159576<a href="#asterisk">*</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>核心</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14140</td> |
| <td>A-65468230<br /> |
| <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=197e7e521384a23b9e585178f3f11c9fa08274b9"> |
| 上游程式庫核心</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>核心</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-15537</td> |
| <td>A-68805943<br /> |
| <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=814fb7bb7db5433757d76f4c4502c96fc53b0b5e"> |
| 上游程式庫核心</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>核心</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="mediatek-components">MediaTek 元件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>參考資料</th> |
| <th>類型</th> |
| <th>嚴重程度</th> |
| <th>元件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13225</td> |
| <td>A-38308024<a href="#asterisk">*</a><br /> |
| M-ALPS03495789</td> |
| <td>EoP</td> |
| <td>高</td> |
| <td>MTK 媒體</td> |
| </tr> |
| </tbody></table> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>參考資料</th> |
| <th>類型</th> |
| <th>嚴重程度</th> |
| <th>元件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13226</td> |
| <td>A-32591194<a href="#asterisk">*</a><br /> |
| M-ALPS03149184</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>MTK</td> |
| </tr> |
| </tbody></table> |
| |
| <h3 id="qualcomm-components">Qualcomm 元件</h3> |
| |
| <table> |
| <colgroup><col width="17%" /> |
| <col width="19%" /> |
| <col width="9%" /> |
| <col width="14%" /> |
| <col width="39%" /> |
| </colgroup><tbody><tr> |
| <th>CVE</th> |
| <th>參考資料</th> |
| <th>類型</th> |
| <th>嚴重程度</th> |
| <th>元件</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-9705</td> |
| <td>A-67713091<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=00515286cf52145f2979026b8641cfb15c8e7644"> |
| QC-CR#2059828</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>SOC 驅動程式</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-15847</td> |
| <td>A-67713087<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=6f510e5c3ffe80ad9ea4271a39a21d3b647e1f0f"> |
| QC-CR#2070309</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>SOC 驅動程式</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-15848</td> |
| <td>A-67713083<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=d24a74a7103cb6b773e1d8136ba51b64fa96b21d"> |
| QC-CR#2073777</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>驅動程式</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11081</td> |
| <td>A-67713113<br /> |
| <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=d650d091aad2b13887b374ddc4268a457040ffc1"> |
| QC-CR#2077622</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-15845</td> |
| <td>A-67713111<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=d39f7f0663394e1e863090108a80946b90236112"> |
| QC-CR#2072966</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14873</td> |
| <td>A-67713104<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=57377acfed328757da280f4adf1c300f0b032422"> |
| QC-CR#2057144</a> |
| [<a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=e9492b99156137cf533722eea6ba8846d424c800"> |
| 2</a>]</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>繪圖驅動程式</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11035</td> |
| <td>A-67713108<br /> |
| <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=aeb7bcf516dfa00295329ec66bd0b62d746f4bbe"> |
| QC-CR#2070583</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>無線網路驅動程式</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11003</td> |
| <td>A-64439673<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=6ca5369f343f942ad925dc01371d87d040235243"> |
| QC-CR#2026193</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>開機載入器</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9689</td> |
| <td>A-62828527<br /> |
| <a href="https://source.codeaurora.org/quic/la/platform/hardware/qcom/display/commit/?id=1583ea20412c1e9abb8c7ce2a916ad955f689530"> |
| QC-CR#2037019</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>HDMI 驅動程式</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14879</td> |
| <td>A-63890276<a href="#asterisk">*</a><br /> |
| QC-CR#2056307</td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>IPA 驅動程式</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11080</td> |
| <td>A-66937382<br /> |
| <a href="https://www.codeaurora.org/gitweb/quic/la/?p=kernel/lk.git;a=commit;h=4f50bba52193cdf917037c98ce38a45aeb4582da"> |
| QC-CR#2078272</a></td> |
| <td>EoP</td> |
| <td>中</td> |
| <td>開機載入器</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14869</td> |
| <td>A-67713093<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=e5d62d222504b9f4f079ea388f0724f471855fbe"> |
| QC-CR#2061498</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>開機載入器</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11066</td> |
| <td>A-65468971<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=5addd693aec592118bd5c870ba547b6311a4aeca"> |
| QC-CR#2068506</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>開機載入器</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-15850</td> |
| <td>A-62464339<a href="#asterisk">*</a><br /> |
| QC-CR#2113240</td> |
| <td>ID</td> |
| <td>中</td> |
| <td>麥克風驅動程式</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9712</td> |
| <td>A-63868883<br /> |
| <a href="https://www.codeaurora.org/gitweb/quic/la/?p=platform/vendor/qcom-opensource/wlan/qcacld-2.0.git;a=commit;h=b1d0e250717fc4d8b7c45cef036ea9d16293c616"> |
| QC-CR#2033195</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>無線網路驅動程式</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11079</td> |
| <td>A-67713100<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=ddae8fa912fd2b207b56733f5294d33c6a956b65"> |
| QC-CR#2078342</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>開機載入器</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-14870</td> |
| <td>A-67713096<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=1ab72362bad8482392de02b425efaab76430de15"> |
| QC-CR#2061506</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>開機載入器</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-11079</td> |
| <td>A-66937383<br /> |
| <a href="https://www.codeaurora.org/gitweb/quic/la/?p=kernel/lk.git;a=commit;h=48bd9bbeab9bc7f489193951338dae6adedbef2e"> |
| QC-CR#2078342</a></td> |
| <td>ID</td> |
| <td>中</td> |
| <td>開機載入器</td> |
| </tr> |
| </tbody></table> |
| |
| <h2 id="functional-updates">功能更新</h2> |
| <p> |
| 這些更新的目的在於解決受影響 Pixel 裝置的功能問題,與 Pixel 裝置的安全性無關。下表列出相關參考資料、受影響的類別 (例如藍牙或行動數據),以及問題摘要。 |
| </p> |
| <table> |
| <tbody><tr> |
| <th>參考資料</th> |
| <th>類別</th> |
| <th>改善的功能</th> |
| </tr> |
| <tr> |
| <td>A-68810306</td> |
| <td>金鑰庫</td> |
| <td>調整金鑰庫中的金鑰升級處理作業。</td> |
| </tr> |
| <tr> |
| <td>A-70213235</td> |
| <td>穩定性</td> |
| <td>提升安裝 OTA 後的穩定性與執行效能。</td> |
| </tr> |
| </tbody></table> |
| |
| <h2 id="common-questions-and-answers">常見問題與解答</h2> |
| <p> |
| 如果您在閱讀這篇公告後有任何疑問,可參考本節的常見問答。 |
| </p> |
| <p> |
| <strong>1. 如何判斷我目前的裝置軟體版本是否已修正這些問題? |
| </strong> |
| </p> |
| <p> |
| 2018-01-05 之後的安全性修補程式等級完全解決了與 2018-01-05 安全性修補程式等級及所有先前修補程式等級相關的問題。請參閱 <a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel 與 Nexus 更新時間表</a>中的操作說明,瞭解如何查看裝置的安全性修補程式等級。 |
| </p> |
| <p id="type"> |
| <strong>2.「類型」<em></em>欄中的項目代表什麼意義?</strong> |
| </p> |
| <p> |
| 資安漏洞詳情表格中「類型」<em></em>欄中的項目代表的是安全性漏洞的類別。 |
| </p> |
| <table> |
| <colgroup><col width="25%" /> |
| <col width="75%" /> |
| </colgroup><tbody><tr> |
| <th>縮寫詞</th> |
| <th>定義</th> |
| </tr> |
| <tr> |
| <td>RCE</td> |
| <td>遠端程式碼執行</td> |
| </tr> |
| <tr> |
| <td>EoP</td> |
| <td>權限升級</td> |
| </tr> |
| <tr> |
| <td>ID</td> |
| <td>資訊外洩</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>拒絕服務</td> |
| </tr> |
| <tr> |
| <td>無</td> |
| <td>未分類</td> |
| </tr> |
| </tbody></table> |
| <p> |
| <strong>3.「參考資料」<em></em>欄底下列出的識別碼代表什麼意義?</strong> |
| </p> |
| <p> |
| 資安漏洞詳情表格中「參考資料」<em></em>欄底下的項目可能會包含一個前置字串,用以表示該參考資料值所屬的機構或公司。 |
| </p> |
| <table> |
| <colgroup><col width="25%" /> |
| <col width="75%" /> |
| </colgroup><tbody><tr> |
| <th>前置字串</th> |
| <th>參考資料</th> |
| </tr> |
| <tr> |
| <td>A-</td> |
| <td>Android 錯誤 ID</td> |
| </tr> |
| <tr> |
| <td>QC-</td> |
| <td>Qualcomm 參考編號</td> |
| </tr> |
| <tr> |
| <td>M-</td> |
| <td>MediaTek 參考編號</td> |
| </tr> |
| <tr> |
| <td>N-</td> |
| <td>NVIDIA 參考編號</td> |
| </tr> |
| <tr> |
| <td>B-</td> |
| <td>Broadcom 參考編號</td> |
| </tr> |
| </tbody></table> |
| <p id="asterisk"> |
| <strong>4.「參考資料」<em></em>欄中 Android 錯誤 ID 旁邊的星號 (*) 代表什麼意義?</strong> |
| </p> |
| <p> |
| 在「參考資料」<em></em>欄中 Android 錯誤 ID 旁邊標上星號 (*) 代表該問題並未公開,相關的更新通常是直接整合在最新的 Nexus 裝置專用驅動程式的安裝檔中。您可以前往 <a href="https://developers.google.com/android/nexus/drivers">Google Developers 網站</a>下載這些驅動程式。 |
| </p> |
| <p> |
| <strong>5. 為什麼安全性漏洞會分別刊載在這份安全性公告和 Android 安全性公告?</strong> |
| </p> |
| <p> |
| 為了宣告 Android 裝置最新的安全性修補程式等級,我們必須先在 Android 安全性公告中刊載相關的安全性漏洞。其他安全性漏洞 (例如本安全性公告所刊載的安全性漏洞) 並未強制規定宣告安全性修補程式等級。 |
| </p> |
| <h2 id="versions">版本</h2> |
| <table> |
| <colgroup><col width="25%" /> |
| <col width="25%" /> |
| <col width="50%" /> |
| </colgroup><tbody><tr> |
| <th>版本</th> |
| <th>日期</th> |
| <th>附註</th> |
| </tr> |
| <tr> |
| <td>1.0</td> |
| <td>2018 年 1 月 2 日</td> |
| <td>發佈公告。</td> |
| </tr> |
| <tr> |
| <td>1.1</td> |
| <td>2018 年 1 月 5 日</td> |
| <td>修訂公告內容 (加入 Android 開放原始碼計劃連結)。</td> |
| </tr> |
| <tr> |
| <td>1.2</td> |
| <td>2018 年 1 月 29 日</td> |
| <td>新增 CVE-2017-13225。</td> |
| </tr> |
| </tbody></table> |
| |
| </body></html> |