aboutsummaryrefslogtreecommitdiff
path: root/src-intl
diff options
context:
space:
mode:
authorGina Dimino <gdimino@google.com>2016-03-07 09:16:40 -0800
committerGina Dimino <gdimino@google.com>2016-03-09 18:27:24 -0800
commit8fffe06875a22afef18054171e146b3fa2078bb5 (patch)
treef89215f83d794a29463426ad880f123194788138 /src-intl
parent3a1e39597625178f2f971ce6ef31c6c1d6764dfe (diff)
downloadsource.android.com-8fffe06875a22afef18054171e146b3fa2078bb5.tar.gz
Docs: Remove translated nav from .jd files.
Bug: 25717633 Change-Id: Ieb8e1c8c54cf1ced9e8de27204210e689a635ad3
Diffstat (limited to 'src-intl')
-rw-r--r--src-intl/ja_ALL/security/bulletin/2015-12-01.jd183
-rw-r--r--src-intl/ja_ALL/security/bulletin/2016-01-01.jd143
-rw-r--r--src-intl/ko_ALL/security/bulletin/2015-12-01.jd183
-rw-r--r--src-intl/ko_ALL/security/bulletin/2016-01-01.jd143
-rw-r--r--src-intl/ru_ALL/security/bulletin/2015-12-01.jd183
-rw-r--r--src-intl/ru_ALL/security/bulletin/2016-01-01.jd143
-rw-r--r--src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd183
-rw-r--r--src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd144
-rw-r--r--src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd184
-rw-r--r--src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd143
10 files changed, 56 insertions, 1576 deletions
diff --git a/src-intl/ja_ALL/security/bulletin/2015-12-01.jd b/src-intl/ja_ALL/security/bulletin/2015-12-01.jd
index 5f9d55cb..165481d3 100644
--- a/src-intl/ja_ALL/security/bulletin/2015-12-01.jd
+++ b/src-intl/ja_ALL/security/bulletin/2015-12-01.jd
@@ -23,149 +23,6 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月
</div>
</div>
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
- <!--
- Copyright 2015 The Android Open Source Project
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
--->
- <div id="qv-wrapper">
- <div id="qv">
- <h2>
- このドキュメントの内容
- </h2>
- <ol id="auto-toc">
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary">
- セキュリティの脆弱性の概要
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations">
- リスクの軽減
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements">
- 謝辞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details">
- セキュリティの脆弱性の詳細
- </a>
- </li>
- <ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver">
- メディアサーバーでのリモートコード実行の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia">
- Skia でのリモートコード実行の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel">
- カーネルでの権限昇格
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver">
- ディスプレイ ドライバでのリモートコード実行の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth">
- Bluetooth でのリモートコード実行の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright">
- libstagefright での権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui">
- SystemUI での権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library">
- Native Frameworks Library での情報開示の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
- Wi-Fi での権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server">
- System Server での権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright">
- libstagefright での情報開示の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio">
- Audio での情報開示の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework">
- Media Framework での情報開示の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi">
- Wi-Fi での情報開示の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19">
- System Server での権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui">
- SystemUI での情報開示の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers">
- 一般的な質問と回答
- </a>
- </li>
- </ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions">
- 改訂
- </a>
- </li>
- </ol>
- </div>
- </div>
- <p>
- <em>
- 2015 年 12 月 7 日公開 | 2015 年 12 月 22 日更新
- </em>
- </p>
<p>
Android のセキュリティに関する月例情報公開の一環として、Nexus 端末に対するセキュリティ アップデートを無線(OTA)アップデートで配信しました。また、Nexus ファームウェア イメージも
<a href="https://developers.google.com/android/nexus/images">
@@ -440,13 +297,9 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月
KeenTeam
</a>
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
)の Flanker(
- <a href="https://twitter.com/flanker_hqd">
- @flanker_hqd
- </a>
+ <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
): CVE-2015-6620
</li>
<li>
@@ -454,16 +307,12 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月
Qihoo 360 Technology Co.Ltd
</a>
の Guang Gong(龚广)(
- <a href="https://twitter.com/oldfresher">
- @oldfresher
- </a>
+ <a href="https://twitter.com/oldfresher"> @oldfresher </a>
、higongguang@gmail.com): CVE-2015-6626
</li>
<li>
EmberMitre Ltd の Mark Carter(
- <a href="https://twitter.com/hanpingchinese">
- @hanpingchinese
- </a>
+ <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a>
): CVE-2015-6630
</li>
<li>
@@ -484,17 +333,11 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月
KeenTeam
</a>
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
)の Qidan He(
- <a href="https://twitter.com/flanker_hqd">
- @flanker_hqd
- </a>
+ <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
)と Marco Grassi(
- <a href="https://twitter.com/marcograss">
- @marcograss
- </a>
+ <a href="https://twitter.com/marcograss"> @marcograss </a>
): CVE-2015-6622
</li>
<li>
@@ -502,9 +345,7 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月
</li>
<li>
Fundación Dr. Manuel Sadosky(アルゼンチン、ブエノスアイレス)Programa STIC の Joaquín Rinaudo(
- <a href="https://twitter.com/xeroxnir">
- @xeroxnir
- </a>
+ <a href="https://twitter.com/xeroxnir"> @xeroxnir </a>
): CVE-2015-6631
</li>
</ul>
@@ -1537,11 +1378,3 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月
2015 年 12 月 22 日: 謝辞にクレジットを追加
</li>
</ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
- <div class="layout-content-col col-9" style="padding-top:4px">
- </div>
- <div class="paging-links layout-content-col col-4">
- </div>
- </div>
-</div>
diff --git a/src-intl/ja_ALL/security/bulletin/2016-01-01.jd b/src-intl/ja_ALL/security/bulletin/2016-01-01.jd
index 867b85c5..c6888c4f 100644
--- a/src-intl/ja_ALL/security/bulletin/2016-01-01.jd
+++ b/src-intl/ja_ALL/security/bulletin/2016-01-01.jd
@@ -23,129 +23,6 @@ page.title=Nexus のセキュリティに関する公開情報 - 2016 年 1 月
</div>
</div>
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
- <!--
- Copyright 2016 The Android Open Source Project
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
--->
- <div id="qv-wrapper">
- <div id="qv">
- <h2>
- このドキュメントの内容
- </h2>
- <ol id="auto-toc">
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary">
- セキュリティの脆弱性の概要
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations">
- リスクの軽減
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements">
- 謝辞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details">
- セキュリティの脆弱性の詳細
- </a>
- </li>
- <ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver">
- メディアサーバーでのリモートコード実行の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver">
- misc-sd ドライバでの権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver">
- Imagination Technologies ドライバでの権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone">
- TrustZone での権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel">
- カーネルでの権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth">
- Bluetooth での権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel">
- カーネルでの情報開示の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard">
- セットアップ ウィザードでの権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
- Wi-Fi での権限昇格の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle">
- Bouncy Castle での情報開示の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager">
- SyncManager でのサービスの拒否の脆弱性
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels">
- Nexus カーネルの攻撃対象領域の削減
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers">
- 一般的な質問と回答
- </a>
- </li>
- </ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions">
- 改訂
- </a>
- </li>
- </ol>
- </div>
- </div>
- <p>
- <em>
- 2016 年 1 月 4 日公開 | 2016 年 1 月 6 日更新
- </em>
- </p>
<p>
Android のセキュリティに関する月例情報公開の一環として、Nexus 端末に対するセキュリティ アップデートを無線(OTA)アップデートで配信しました。また、Nexus ファームウェア イメージも
<a href="https://developers.google.com/android/nexus/images">
@@ -367,13 +244,9 @@ page.title=Nexus のセキュリティに関する公開情報 - 2016 年 1 月
</li>
<li>
Tencent KEEN lab(
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
)の Sen Nie(
- <a href="https://twitter.com/@nforest_">
- @nforest_
- </a>
+ <a href="https://twitter.com/@nforest_"> @nforest_ </a>
)と jfang: CVE-2015-6637
</li>
<li>
@@ -397,9 +270,7 @@ page.title=Nexus のセキュリティに関する公開情報 - 2016 年 1 月
</li>
<li>
Gal Beniamini(
- <a href="https://twitter.com/@laginimaineb">
- @laginimaineb
- </a>
+ <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a>
<a href="http://bits-please.blogspot.com/">
http://bits-please.blogspot.com
@@ -1094,11 +965,3 @@ page.title=Nexus のセキュリティに関する公開情報 - 2016 年 1 月
2016 年 1 月 6 日: 公開情報を改訂し AOSP リンクを追加
</li>
</ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
- <div class="layout-content-col col-9" style="padding-top:4px">
- </div>
- <div class="paging-links layout-content-col col-4">
- </div>
- </div>
-</div>
diff --git a/src-intl/ko_ALL/security/bulletin/2015-12-01.jd b/src-intl/ko_ALL/security/bulletin/2015-12-01.jd
index e77ce355..902a7531 100644
--- a/src-intl/ko_ALL/security/bulletin/2015-12-01.jd
+++ b/src-intl/ko_ALL/security/bulletin/2015-12-01.jd
@@ -23,149 +23,6 @@ page.title=Nexus 보안 게시판 - 2015년 12월
</div>
</div>
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
- <!--
- Copyright 2015 The Android Open Source Project
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
--->
- <div id="qv-wrapper">
- <div id="qv">
- <h2>
- 이 문서에서 다루는 내용
- </h2>
- <ol id="auto-toc">
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary">
- 보안 취약성 요약
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations">
- 완화
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements">
- 사사
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details">
- 보안 취약성 세부정보
- </a>
- </li>
- <ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver">
- 미디어 서버의 원격 코드 실행 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia">
- Skia의 원격 코드 실행 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel">
- 커널의 권한 승격
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver">
- 디스플레이 드라이버의 원격 코드 실행 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth">
- 블루투스의 원격 코드 실행 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright">
- libstagefright의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui">
- SystemUI의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library">
- 기본 프레임워크 라이브러리의 정보 공개 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
- Wi-Fi의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server">
- 시스템 서버의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright">
- libstagefright의 정보 공개 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio">
- 오디오의 정보 공개 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework">
- 미디어 프레임워크의 정보 공개 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi">
- Wi-Fi의 정보 공개 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19">
- 시스템 서버의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui">
- SystemUI의 정보 공개 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers">
- 일반적인 질문 및 답변
- </a>
- </li>
- </ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions">
- 버전
- </a>
- </li>
- </ol>
- </div>
- </div>
- <p>
- <em>
- 2015년 12월 7일 게시됨 | 2015년 12월 22일 업데이트됨
- </em>
- </p>
<p>
Google의 Android 보안 게시판 월간 출시 과정의 일환으로 무선
업데이트를 통해 Nexus 기기에 대한 보안 업데이트가 출시되었습니다.
@@ -467,13 +324,9 @@ CVE-2015-6619, CVE-2015-6633, CVE-2015-6634
KeenTeam
</a>
(
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
)의 Flanker(
- <a href="https://twitter.com/flanker_hqd">
- @flanker_hqd
- </a>
+ <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
): CVE-2015-6620
</li>
<li>
@@ -481,16 +334,12 @@ CVE-2015-6619, CVE-2015-6633, CVE-2015-6634
Qihoo 360 Technology Co.Ltd
</a>
의 Guang Gong(龚广)(
- <a href="https://twitter.com/oldfresher">
- @oldfresher
- </a>
+ <a href="https://twitter.com/oldfresher"> @oldfresher </a>
, higongguang@gmail.com): CVE-2015-6626
</li>
<li>
EmberMitre Ltd의 Mark Carter(
- <a href="https://twitter.com/hanpingchinese">
- @hanpingchinese
- </a>
+ <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a>
): CVE-2015-6630
</li>
<li>
@@ -511,17 +360,11 @@ CVE-2015-6619, CVE-2015-6633, CVE-2015-6634
KeenTeam
</a>
(
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
)의 Qidan He(
- <a href="https://twitter.com/flanker_hqd">
- @flanker_hqd
- </a>
+ <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
), Marco Grassi(
- <a href="https://twitter.com/marcograss">
- @marcograss
- </a>
+ <a href="https://twitter.com/marcograss"> @marcograss </a>
): CVE-2015-6622
</li>
<li>
@@ -529,9 +372,7 @@ CVE-2015-6619, CVE-2015-6633, CVE-2015-6634
</li>
<li>
아르헨티나 부에노스아이레스 Fundación Dr. Manuel Sadosky, Programa STIC의 Joaquín Rinaudo(
- <a href="https://twitter.com/xeroxnir">
- @xeroxnir
- </a>
+ <a href="https://twitter.com/xeroxnir"> @xeroxnir </a>
): CVE-2015-6631
</li>
</ul>
@@ -1630,11 +1471,3 @@ libstagefright의 정보 공개 취약성이 있습니다. 이 문제는
2015년 12월 22일: 사사 섹션에 누락된 크레딧 추가됨
</li>
</ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
- <div class="layout-content-col col-9" style="padding-top:4px">
- </div>
- <div class="paging-links layout-content-col col-4">
- </div>
- </div>
-</div>
diff --git a/src-intl/ko_ALL/security/bulletin/2016-01-01.jd b/src-intl/ko_ALL/security/bulletin/2016-01-01.jd
index 931b68c4..07574abd 100644
--- a/src-intl/ko_ALL/security/bulletin/2016-01-01.jd
+++ b/src-intl/ko_ALL/security/bulletin/2016-01-01.jd
@@ -23,129 +23,6 @@ page.title=Nexus 보안 게시판 - 2016년 1월
</div>
</div>
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
- <!--
- Copyright 2016 The Android Open Source Project
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
--->
- <div id="qv-wrapper">
- <div id="qv">
- <h2>
- 이 문서에서 다루는 내용
- </h2>
- <ol id="auto-toc">
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary">
- 보안 취약성 요약
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations">
- 완화
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements">
- 사사
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details">
- 보안 취약성 세부정보
- </a>
- </li>
- <ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver">
- 미디어 서버의 원격 코드 실행 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver">
- misc-sd 드라이버의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver">
- Imagination Technologies 드라이버의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone">
- Trustzone의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel">
- 커널의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth">
- 블루투스의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel">
- 커널의 정보 공개 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard">
- 설치 마법사의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
- Wi-Fi의 권한 승격 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle">
- Bouncy Castle의 정보 공개 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager">
- SyncManager의 서비스 거부(DoS) 취약성
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels">
- Nexus 커널의 공격 범위 축소
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers">
- 일반적인 질문 및 답변
- </a>
- </li>
- </ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions">
- 버전
- </a>
- </li>
- </ol>
- </div>
- </div>
- <p>
- <em>
- 2016년 1월 4일 게시됨 | 2016년 1월 6일 업데이트됨
- </em>
- </p>
<p>
Google의 Android 보안 게시판 월간 출시 과정의 일환으로 무선
업데이트를 통해 Nexus 기기에 대한 보안 업데이트가 출시되었습니다.
@@ -392,13 +269,9 @@ Google Play 외부에서 애플리케이션을 설치하는 사용자를 보호
</li>
<li>
KEEN lab, Tencent(
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
)의 Sen Nie(
- <a href="https://twitter.com/@nforest_">
- @nforest_
- </a>
+ <a href="https://twitter.com/@nforest_"> @nforest_ </a>
), jfang: CVE-2015-6637
</li>
<li>
@@ -422,9 +295,7 @@ Google Play 외부에서 애플리케이션을 설치하는 사용자를 보호
</li>
<li>
Gal Beniamini(
- <a href="https://twitter.com/@laginimaineb">
- @laginimaineb
- </a>
+ <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a>
,
<a href="http://bits-please.blogspot.com/">
http://bits-please.blogspot.com
@@ -1167,11 +1038,3 @@ Android 6.0 이상에서 해결됩니다. 보안 패치 수준을 확인하는
2016년 1월 6일: 게시판이 수정되어 AOSP 링크 포함됨
</li>
</ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
- <div class="layout-content-col col-9" style="padding-top:4px">
- </div>
- <div class="paging-links layout-content-col col-4">
- </div>
- </div>
-</div>
diff --git a/src-intl/ru_ALL/security/bulletin/2015-12-01.jd b/src-intl/ru_ALL/security/bulletin/2015-12-01.jd
index d6cc7147..a1e0effc 100644
--- a/src-intl/ru_ALL/security/bulletin/2015-12-01.jd
+++ b/src-intl/ru_ALL/security/bulletin/2015-12-01.jd
@@ -23,149 +23,6 @@ page.title=Бюллетень по безопасности Nexus – дека
</div>
</div>
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
- <!--
- Copyright 2015 The Android Open Source Project
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
--->
- <div id="qv-wrapper">
- <div id="qv">
- <h2>
- В этом документе
- </h2>
- <ol id="auto-toc">
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary">
- Перечень уязвимостей
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations">
- Предотвращение атак
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements">
- Благодарности
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details">
- Описание уязвимостей
- </a>
- </li>
- <ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver">
- Удаленное выполнение кода через mediaserver
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia">
- Удаленное выполнение кода через Skia
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel">
- Повышение привилегий через ядро
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver">
- Удаленное выполнение кода через драйверы экрана
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth">
- Удаленное выполнение кода через Bluetooth
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright">
- Повышение привилегий через libstagefright
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui">
- Повышение привилегий через SystemUI
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library">
- Раскрытие информации через библиотеку фреймворков Android
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
- Повышение привилегий через Wi-Fi
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server">
- Повышение привилегий через SystemServer
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright">
- Раскрытие информации через libstagefright
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio">
- Раскрытие информации через Audio
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework">
- Раскрытие информации через Media Framework
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi">
- Раскрытие информации через Wi-Fi
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19">
- Повышение привилегий через SystemServer
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui">
- Раскрытие информации через SystemUI
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers">
- Часто задаваемые вопросы
- </a>
- </li>
- </ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions">
- Версии
- </a>
- </li>
- </ol>
- </div>
- </div>
- <p>
- <em>
- Опубликовано 7 декабря 2015 г. | Обновлено 22 декабря 2015 г.
- </em>
- </p>
<p>
К выходу ежемесячного бюллетеня о безопасности Android мы выпустили
автоматическое обновление системы безопасности для устройств Nexus
@@ -466,24 +323,18 @@ CVE-2015-6634.
</li>
<li>
Флэнкер (
- <a href="https://twitter.com/flanker_hqd">
- @flanker_hqd
- </a>
+ <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
) из
<a href="http://k33nteam.org/">
KeenTeam
</a>
(
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
): CVE-2015-6620.
</li>
<li>
Гуан Гун (龚广) (
- <a href="https://twitter.com/oldfresher">
- @oldfresher
- </a>
+ <a href="https://twitter.com/oldfresher"> @oldfresher </a>
, higongguang@gmail.com) из
<a href="http://www.360.cn/">
Qihoo 360
@@ -493,9 +344,7 @@ Technology Co.Ltd
</li>
<li>
Марк Картер (
- <a href="https://twitter.com/hanpingchinese">
- @hanpingchinese
- </a>
+ <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a>
) из EmberMitre Ltd: CVE-2015-6630.
</li>
<li>
@@ -513,21 +362,15 @@ Technology Co.Ltd
</li>
<li>
Цидань Хэ (
- <a href="https://twitter.com/flanker_hqd">
- @flanker_hqd
- </a>
+ <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
) и Марко Грасси (
- <a href="https://twitter.com/marcograss">
- @marcograss
- </a>
+ <a href="https://twitter.com/marcograss"> @marcograss </a>
) из
<a href="http://k33nteam.org/">
KeenTeam
</a>
(
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
): CVE-2015-6622.
</li>
<li>
@@ -535,9 +378,7 @@ Technology Co.Ltd
</li>
<li>
Жуакин Ринауду (
- <a href="https://twitter.com/xeroxnir">
- @xeroxnir
- </a>
+ <a href="https://twitter.com/xeroxnir"> @xeroxnir </a>
), участник Программы безопасности ИКТ
Фонда доктора Мануэля Садоски, Буэнос-Айрес, Аргентина: CVE-2015-6631.
</li>
@@ -1652,11 +1493,3 @@ Bluetooth-модема), то злоумышленник может выполн
22 декабря 2015 года. Добавлены благодарности.
</li>
</ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
- <div class="layout-content-col col-9" style="padding-top:4px">
- </div>
- <div class="paging-links layout-content-col col-4">
- </div>
- </div>
-</div>
diff --git a/src-intl/ru_ALL/security/bulletin/2016-01-01.jd b/src-intl/ru_ALL/security/bulletin/2016-01-01.jd
index 4c9bd5f6..8df53204 100644
--- a/src-intl/ru_ALL/security/bulletin/2016-01-01.jd
+++ b/src-intl/ru_ALL/security/bulletin/2016-01-01.jd
@@ -23,129 +23,6 @@ page.title=Бюллетень по безопасности Nexus – янва
</div>
</div>
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
- <!--
- Copyright 2016 The Android Open Source Project
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
--->
- <div id="qv-wrapper">
- <div id="qv">
- <h2>
- В этом документе
- </h2>
- <ol id="auto-toc">
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary">
- Перечень уязвимостей
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations">
- Предотвращение атак
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements">
- Благодарности
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details">
- Описание уязвимостей
- </a>
- </li>
- <ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver">
- Удаленное выполнение кода через mediaserver
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver">
- Повышение привилегий через драйвер misc-sd
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver">
- Повышение привилегий через драйвер Imagination Technologies
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone">
- Повышение привилегий через Trustzone
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel">
- Повышение привилегий через ядро
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth">
- Повышение привилегий через Bluetooth
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel">
- Раскрытие информации через ядро
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard">
- Повышение привилегий через мастер настройки
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
- Повышение привилегий через Wi-Fi
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle">
- Раскрытие информации через Bouncy Castle
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager">
- Отказ в обслуживании в SyncManager
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels">
- Снижение вероятности атаки в ядрах устройств Nexus
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers">
- Часто задаваемые вопросы
- </a>
- </li>
- </ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions">
- Версии
- </a>
- </li>
- </ol>
- </div>
- </div>
- <p>
- <em>
- Опубликовано 4 января 2016 г. | Обновлено 6 января 2016 г.
- </em>
- </p>
<p>
К выходу ежемесячного бюллетеня о безопасности Android мы выпустили
автоматическое обновление системы безопасности для устройств Nexus
@@ -395,13 +272,9 @@ SafetyNet, помогают снизить вероятность атак на
</li>
<li>
Сен Ние (
- <a href="https://twitter.com/@nforest_">
- @nforest_
- </a>
+ <a href="https://twitter.com/@nforest_"> @nforest_ </a>
) и jfang из KEEN lab, Tencent (
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
):
CVE-2015-6637.
</li>
@@ -426,9 +299,7 @@ CVE-2015-6637.
</li>
<li>
Гэл Бениамини (
- <a href="https://twitter.com/@laginimaineb">
- @laginimaineb
- </a>
+ <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a>
,
<a href="http://bits-please.blogspot.com/">
http://bits-please.blogspot.com
@@ -1191,11 +1062,3 @@ Trustzone. Уязвимости присвоен критический уров
6 января 2016 года. Добавлены ссылки на AOSP.
</li>
</ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
- <div class="layout-content-col col-9" style="padding-top:4px">
- </div>
- <div class="paging-links layout-content-col col-4">
- </div>
- </div>
-</div>
diff --git a/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd b/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd
index 19fd79b8..3a05773e 100644
--- a/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd
+++ b/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd
@@ -23,149 +23,6 @@ page.title=Nexus 安全公告 - 2015 年 12 月
</div>
</div>
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
- <!--
- Copyright 2015 The Android Open Source Project
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
--->
- <div id="qv-wrapper">
- <div id="qv">
- <h2>
- 本文内容
- </h2>
- <ol id="auto-toc">
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary">
- 安全漏洞摘要
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations">
- 缓解措施
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements">
- 致谢
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details">
- 安全漏洞详情
- </a>
- </li>
- <ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver">
- Mediaserver 中的远程代码执行漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia">
- Skia 中的远程代码执行漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel">
- 内核中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver">
- 显卡驱动程序中的远程代码执行漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth">
- 蓝牙中的远程代码执行漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright">
- libstagefright 中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui">
- SystemUI 中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library">
- Native Frameworks Library 中的信息披露漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
- WLAN 中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server">
- 系统服务器中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright">
- libstagefright 中的信息披露漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio">
- 音频中的信息披露漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework">
- 媒体框架中的信息披露漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi">
- WLAN 中的信息披露漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19">
- 系统服务器中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui">
- SystemUI 中的信息披露漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers">
- 常见问题和解答
- </a>
- </li>
- </ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions">
- 修订版本
- </a>
- </li>
- </ol>
- </div>
- </div>
- <p>
- <em>
- 发布时间:2015 年 12 月 7 日 | 更新时间:2015 年 12 月 22 日
- </em>
- </p>
<p>
在每月发布 Android 安全公告的过程中,我们都会通过无线 (OTA) 更新的方式发布针对 Nexus 设备的安全更新。我们还会在
<a href="https://developers.google.com/android/nexus/images">
@@ -440,13 +297,9 @@ page.title=Nexus 安全公告 - 2015 年 12 月
碁震安全研究团队
</a>
(
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
) 的 Flanker (
- <a href="https://twitter.com/flanker_hqd">
- @flanker_hqd
- </a>
+ <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
):CVE-2015-6620
</li>
<li>
@@ -454,16 +307,12 @@ page.title=Nexus 安全公告 - 2015 年 12 月
奇虎 360 科技有限公司
</a>
的龚广(
- <a href="https://twitter.com/oldfresher">
- @oldfresher
- </a>
+ <a href="https://twitter.com/oldfresher"> @oldfresher </a>
、higongguang@gmail.com):CVE-2015-6626
</li>
<li>
EmberMitre Ltd 的 Mark Carter (
- <a href="https://twitter.com/hanpingchinese">
- @hanpingchinese
- </a>
+ <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a>
):CVE-2015-6630
</li>
<li>
@@ -484,17 +333,11 @@ page.title=Nexus 安全公告 - 2015 年 12 月
碁震安全研究团队
</a>
(
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
) 的 Qidan He (
- <a href="https://twitter.com/flanker_hqd">
- @flanker_hqd
- </a>
+ <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
) 和 Marco Grassi (
- <a href="https://twitter.com/marcograss">
- @marcograss
- </a>
+ <a href="https://twitter.com/marcograss"> @marcograss </a>
):CVE-2015-6622
</li>
<li>
@@ -502,9 +345,7 @@ page.title=Nexus 安全公告 - 2015 年 12 月
</li>
<li>
阿根廷布宜诺斯艾利斯 Dr. Manuel Sadosky 基金会 Programa STIC 的 Joaquín Rinaudo (
- <a href="https://twitter.com/xeroxnir">
- @xeroxnir
- </a>
+ <a href="https://twitter.com/xeroxnir"> @xeroxnir </a>
):CVE-2015-6631
</li>
</ul>
@@ -1537,11 +1378,3 @@ page.title=Nexus 安全公告 - 2015 年 12 月
2015 年 12 月 22 日:在“致谢”部分新添了遗漏的内容。
</li>
</ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
- <div class="layout-content-col col-9" style="padding-top:4px">
- </div>
- <div class="paging-links layout-content-col col-4">
- </div>
- </div>
-</div>
diff --git a/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd b/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd
index 158bbc8a..c00c665c 100644
--- a/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd
+++ b/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd
@@ -16,6 +16,7 @@ page.title=Nexus 安全公告 - 2016 年 1 月
See the License for the specific language governing permissions and
limitations under the License.
-->
+
<div id="qv-wrapper">
<div id="qv">
<ol id="auto-toc">
@@ -23,129 +24,6 @@ page.title=Nexus 安全公告 - 2016 年 1 月
</div>
</div>
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
- <!--
- Copyright 2016 The Android Open Source Project
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
--->
- <div id="qv-wrapper">
- <div id="qv">
- <h2>
- 本文内容
- </h2>
- <ol id="auto-toc">
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary">
- 安全漏洞摘要
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations">
- 缓解措施
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements">
- 致谢
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details">
- 安全漏洞详情
- </a>
- </li>
- <ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver">
- Mediaserver 中的远程代码执行漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver">
- misc-sd 驱动程序中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver">
- Imagination Technologies 驱动程序中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone">
- TrustZone 中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel">
- 内核中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth">
- 蓝牙中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel">
- 内核中的信息披露漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard">
- 设置向导中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
- WLAN 中的提权漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle">
- Bouncy Castle 中的信息披露漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager">
- SyncManager 中的拒绝服务漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels">
- 减少 Nexus 内核的受攻击面
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers">
- 常见问题和解答
- </a>
- </li>
- </ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions">
- 修订版本
- </a>
- </li>
- </ol>
- </div>
- </div>
- <p>
- <em>
- 发布时间:2016 年 1 月 4 日 | 更新时间:2016 年 1 月 6 日
- </em>
- </p>
<p>
在每月发布 Android 安全公告的过程中,我们都会通过无线 (OTA) 更新的方式发布针对 Nexus 设备的安全更新。我们还会在
<a href="https://developers.google.com/android/nexus/images">
@@ -367,13 +245,9 @@ page.title=Nexus 安全公告 - 2016 年 1 月
</li>
<li>
腾讯 KEEN 实验室 (
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
) 的 Sen Nie (
- <a href="https://twitter.com/@nforest_">
- @nforest_
- </a>
+ <a href="https://twitter.com/@nforest_"> @nforest_ </a>
) 和 jfang:CVE-2015-6637
</li>
<li>
@@ -397,9 +271,7 @@ page.title=Nexus 安全公告 - 2016 年 1 月
</li>
<li>
Gal Beniamini (
- <a href="https://twitter.com/@laginimaineb">
- @laginimaineb
- </a>
+ <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a>
<a href="http://bits-please.blogspot.com/">
http://bits-please.blogspot.com
@@ -1094,11 +966,3 @@ page.title=Nexus 安全公告 - 2016 年 1 月
2016 年 1 月 6 日:修订了公告,添加 AOSP 链接。
</li>
</ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
- <div class="layout-content-col col-9" style="padding-top:4px">
- </div>
- <div class="paging-links layout-content-col col-4">
- </div>
- </div>
-</div>
diff --git a/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd b/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd
index d4dc03d2..e05b38c2 100644
--- a/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd
+++ b/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd
@@ -23,149 +23,6 @@ page.title=Nexus 安全性公告 - 2015 年 12 月
</div>
</div>
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
- <!--
- Copyright 2015 The Android Open Source Project
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
--->
- <div id="qv-wrapper">
- <div id="qv">
- <h2>
- 本文內容
- </h2>
- <ol id="auto-toc">
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary">
- 安全性漏洞摘要
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations">
- 因應措施
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements">
- 特別銘謝
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details">
- 安全性漏洞詳情
- </a>
- </li>
- <ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver">
- 媒體伺服器中的遠端程式碼執行漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia">
- Skia 中的遠端程式碼執行漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel">
- 核心中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver">
- 顯示器驅動程式中的遠端程式碼執行漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth">
- 藍牙中的遠端程式碼執行漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright">
- libstagefright 中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui">
- SystemUI 中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library">
- 原生架構程式庫中的資訊外洩漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
- Wi-Fi 中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server">
- 系統伺服器中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright">
- libstagefright 中的資訊外洩漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio">
- 音訊中的資訊外洩漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework">
- 媒體架構中的資訊外洩漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi">
- Wi-Fi 中的資訊外洩漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19">
- 系統伺服器中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui">
- SystemUI 中的資訊外洩漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers">
- 常見問題與解答
- </a>
- </li>
- </ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions">
- 修訂版本
- </a>
- </li>
- </ol>
- </div>
- </div>
- <p>
- <em>
- 發佈日期:2015 年 12 月 7 日 | 更新日期:2015 年 12 月 22 日
- </em>
- </p>
<p>
Google 已透過 Android 安全性公佈欄每月公告程序中的無線 (OTA) 更新,
發佈 Nexus 裝置的安全性更新。
@@ -462,13 +319,9 @@ CVE-2015-6619、CVE-2015-6633、CVE-2015-6634
KeenTeam
</a>
(
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam">@K33nTeam </a>
) 的 Flanker (
- <a href="https://twitter.com/flanker_hqd">
- @flanker_hqd
- </a>
+ <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
):CVE-2015-6620
</li>
<li>
@@ -476,17 +329,12 @@ CVE-2015-6619、CVE-2015-6633、CVE-2015-6634
奇虎 360 科技有限公司
</a>
的 Guang Gong (龔廣) (
- <a href="https://twitter.com/oldfresher">
- @oldfresher
- </a>
+ <a href="https://twitter.com/oldfresher">@oldfresher </a>
,higongguang@gmail.com):CVE-2015-6626
</li>
<li>
EmberMitre Ltd 的 Mark Carter (
- <a href="https://twitter.com/hanpingchinese">
- @hanpingchinese
- </a>
- ):CVE-2015-6630
+ <a href="https://twitter.com/hanpingchinese">@hanpingchinese </a>):CVE-2015-6630
</li>
<li>
Michał Bednarski (
@@ -506,17 +354,11 @@ CVE-2015-6619、CVE-2015-6633、CVE-2015-6634
KeenTeam
</a>
(
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam">@K33nTeam</a>
) 的 Qidan He (
- <a href="https://twitter.com/flanker_hqd">
- @flanker_hqd
- </a>
+ <a href="https://twitter.com/flanker_hqd">@flanker_hqd</a>
) 和 Marco Grassi (
- <a href="https://twitter.com/marcograss">
- @marcograss
- </a>
+ <a href="https://twitter.com/marcograss">@marcograss</a>
):CVE-2015-6622
</li>
<li>
@@ -525,9 +367,7 @@ CVE-2015-6619、CVE-2015-6633、CVE-2015-6634
<li>
阿根廷布宜諾斯艾利斯 Dr. Manuel Sadosky 基金會
Programa STIC 的 Joaquín Rinaudo (
- <a href="https://twitter.com/xeroxnir">
- @xeroxnir
- </a>
+ <a href="https://twitter.com/xeroxnir"> @xeroxnir </a>
):CVE-2015-6631
</li>
</ul>
@@ -1635,11 +1475,3 @@ CVE-2015-6619、CVE-2015-6633、CVE-2015-6634
2015 年 12 月 22 日:在「特別銘謝」部分新增遺漏的銘謝對象。
</li>
</ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
- <div class="layout-content-col col-9" style="padding-top:4px">
- </div>
- <div class="paging-links layout-content-col col-4">
- </div>
- </div>
-</div>
diff --git a/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd b/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd
index 4bd8f71c..9d09d4c8 100644
--- a/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd
+++ b/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd
@@ -23,129 +23,6 @@ page.title=Nexus 安全性公告 - 2016 年 1 月
</div>
</div>
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
- <!--
- Copyright 2016 The Android Open Source Project
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
--->
- <div id="qv-wrapper">
- <div id="qv">
- <h2>
- 本文內容
- </h2>
- <ol id="auto-toc">
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary">
- 安全性漏洞摘要
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations">
- 因應措施
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements">
- 特別銘謝
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details">
- 安全性漏洞詳情
- </a>
- </li>
- <ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver">
- 媒體伺服器中的遠端程式碼執行漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver">
- misc-sd 驅動程式中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver">
- Imagination Technologies 驅動程式中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone">
- Trustzone 中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel">
- 核心中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth">
- 藍牙中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel">
- 核心中的資訊外洩漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard">
- 設定精靈中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
- Wi-Fi 中的權限升級漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle">
- Bouncy Castle 中的資訊外洩漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager">
- SyncManager 中的拒絕服務漏洞
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels">
- 縮減 Nexus 核心的受攻擊面
- </a>
- </li>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers">
- 常見問題與解答
- </a>
- </li>
- </ol>
- <li>
- <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions">
- 修訂版本
- </a>
- </li>
- </ol>
- </div>
- </div>
- <p>
- <em>
- 發佈日期:2016 年 1 月 4 日 | 更新日期:2016 年 1 月 6 日
- </em>
- </p>
<p>
Google 已透過 Android 安全性公佈欄每月公告程序中的無線 (OTA) 更新,
發佈 Nexus 裝置的安全性更新。
@@ -390,13 +267,9 @@ CVE-2015-6636、CVE-2015-6617
</li>
<li>
騰訊 (
- <a href="https://twitter.com/k33nteam">
- @K33nTeam
- </a>
+ <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
) KEEN 實驗室的 Sen Nie (
- <a href="https://twitter.com/@nforest_">
- @nforest_
- </a>
+ <a href="https://twitter.com/@nforest_"> @nforest_ </a>
) 和 jfang:CVE-2015-6637
</li>
<li>
@@ -420,9 +293,7 @@ CVE-2015-6636、CVE-2015-6617
</li>
<li>
Gal Beniamini (
- <a href="https://twitter.com/@laginimaineb">
- @laginimaineb
- </a>
+ <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a>
<a href="http://bits-please.blogspot.com/">
http://bits-please.blogspot.com
@@ -1183,11 +1054,3 @@ IPC 與 Android 的應用程式生命週期並不相容,原因是
2016 年 1 月 6 日:修訂公告,加入 AOSP 連結。
</li>
</ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
- <div class="layout-content-col col-9" style="padding-top:4px">
- </div>
- <div class="paging-links layout-content-col col-4">
- </div>
- </div>
-</div>