diff options
author | Gina Dimino <gdimino@google.com> | 2016-03-07 09:16:40 -0800 |
---|---|---|
committer | Gina Dimino <gdimino@google.com> | 2016-03-09 18:27:24 -0800 |
commit | 8fffe06875a22afef18054171e146b3fa2078bb5 (patch) | |
tree | f89215f83d794a29463426ad880f123194788138 /src-intl | |
parent | 3a1e39597625178f2f971ce6ef31c6c1d6764dfe (diff) | |
download | source.android.com-8fffe06875a22afef18054171e146b3fa2078bb5.tar.gz |
Docs: Remove translated nav from .jd files.
Bug: 25717633
Change-Id: Ieb8e1c8c54cf1ced9e8de27204210e689a635ad3
Diffstat (limited to 'src-intl')
-rw-r--r-- | src-intl/ja_ALL/security/bulletin/2015-12-01.jd | 183 | ||||
-rw-r--r-- | src-intl/ja_ALL/security/bulletin/2016-01-01.jd | 143 | ||||
-rw-r--r-- | src-intl/ko_ALL/security/bulletin/2015-12-01.jd | 183 | ||||
-rw-r--r-- | src-intl/ko_ALL/security/bulletin/2016-01-01.jd | 143 | ||||
-rw-r--r-- | src-intl/ru_ALL/security/bulletin/2015-12-01.jd | 183 | ||||
-rw-r--r-- | src-intl/ru_ALL/security/bulletin/2016-01-01.jd | 143 | ||||
-rw-r--r-- | src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd | 183 | ||||
-rw-r--r-- | src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd | 144 | ||||
-rw-r--r-- | src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd | 184 | ||||
-rw-r--r-- | src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd | 143 |
10 files changed, 56 insertions, 1576 deletions
diff --git a/src-intl/ja_ALL/security/bulletin/2015-12-01.jd b/src-intl/ja_ALL/security/bulletin/2015-12-01.jd index 5f9d55cb..165481d3 100644 --- a/src-intl/ja_ALL/security/bulletin/2015-12-01.jd +++ b/src-intl/ja_ALL/security/bulletin/2015-12-01.jd @@ -23,149 +23,6 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月 </div> </div> -<div id="jd-content"> - <div class="jd-descr" itemprop="articleBody"> - <!-- - Copyright 2015 The Android Open Source Project - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. ---> - <div id="qv-wrapper"> - <div id="qv"> - <h2> - このドキュメントの内容 - </h2> - <ol id="auto-toc"> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary"> - セキュリティの脆弱性の概要 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations"> - リスクの軽減 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements"> - 謝辞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details"> - セキュリティの脆弱性の詳細 - </a> - </li> - <ol> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver"> - メディアサーバーでのリモートコード実行の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia"> - Skia でのリモートコード実行の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel"> - カーネルでの権限昇格 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver"> - ディスプレイ ドライバでのリモートコード実行の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth"> - Bluetooth でのリモートコード実行の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright"> - libstagefright での権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui"> - SystemUI での権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library"> - Native Frameworks Library での情報開示の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi"> - Wi-Fi での権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server"> - System Server での権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright"> - libstagefright での情報開示の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio"> - Audio での情報開示の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework"> - Media Framework での情報開示の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi"> - Wi-Fi での情報開示の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19"> - System Server での権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui"> - SystemUI での情報開示の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers"> - 一般的な質問と回答 - </a> - </li> - </ol> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions"> - 改訂 - </a> - </li> - </ol> - </div> - </div> - <p> - <em> - 2015 年 12 月 7 日公開 | 2015 年 12 月 22 日更新 - </em> - </p> <p> Android のセキュリティに関する月例情報公開の一環として、Nexus 端末に対するセキュリティ アップデートを無線(OTA)アップデートで配信しました。また、Nexus ファームウェア イメージも <a href="https://developers.google.com/android/nexus/images"> @@ -440,13 +297,9 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月 KeenTeam </a> ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> )の Flanker( - <a href="https://twitter.com/flanker_hqd"> - @flanker_hqd - </a> + <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a> ): CVE-2015-6620 </li> <li> @@ -454,16 +307,12 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月 Qihoo 360 Technology Co.Ltd </a> の Guang Gong(龚广)( - <a href="https://twitter.com/oldfresher"> - @oldfresher - </a> + <a href="https://twitter.com/oldfresher"> @oldfresher </a> 、higongguang@gmail.com): CVE-2015-6626 </li> <li> EmberMitre Ltd の Mark Carter( - <a href="https://twitter.com/hanpingchinese"> - @hanpingchinese - </a> + <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a> ): CVE-2015-6630 </li> <li> @@ -484,17 +333,11 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月 KeenTeam </a> ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> )の Qidan He( - <a href="https://twitter.com/flanker_hqd"> - @flanker_hqd - </a> + <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a> )と Marco Grassi( - <a href="https://twitter.com/marcograss"> - @marcograss - </a> + <a href="https://twitter.com/marcograss"> @marcograss </a> ): CVE-2015-6622 </li> <li> @@ -502,9 +345,7 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月 </li> <li> Fundación Dr. Manuel Sadosky(アルゼンチン、ブエノスアイレス)Programa STIC の Joaquín Rinaudo( - <a href="https://twitter.com/xeroxnir"> - @xeroxnir - </a> + <a href="https://twitter.com/xeroxnir"> @xeroxnir </a> ): CVE-2015-6631 </li> </ul> @@ -1537,11 +1378,3 @@ page.title=Nexus のセキュリティに関する公開情報 - 2015 年 12 月 2015 年 12 月 22 日: 謝辞にクレジットを追加 </li> </ul> - </div> - <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement"> - <div class="layout-content-col col-9" style="padding-top:4px"> - </div> - <div class="paging-links layout-content-col col-4"> - </div> - </div> -</div> diff --git a/src-intl/ja_ALL/security/bulletin/2016-01-01.jd b/src-intl/ja_ALL/security/bulletin/2016-01-01.jd index 867b85c5..c6888c4f 100644 --- a/src-intl/ja_ALL/security/bulletin/2016-01-01.jd +++ b/src-intl/ja_ALL/security/bulletin/2016-01-01.jd @@ -23,129 +23,6 @@ page.title=Nexus のセキュリティに関する公開情報 - 2016 年 1 月 </div> </div> -<div id="jd-content"> - <div class="jd-descr" itemprop="articleBody"> - <!-- - Copyright 2016 The Android Open Source Project - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. ---> - <div id="qv-wrapper"> - <div id="qv"> - <h2> - このドキュメントの内容 - </h2> - <ol id="auto-toc"> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary"> - セキュリティの脆弱性の概要 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations"> - リスクの軽減 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements"> - 謝辞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details"> - セキュリティの脆弱性の詳細 - </a> - </li> - <ol> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver"> - メディアサーバーでのリモートコード実行の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver"> - misc-sd ドライバでの権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver"> - Imagination Technologies ドライバでの権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone"> - TrustZone での権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel"> - カーネルでの権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth"> - Bluetooth での権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel"> - カーネルでの情報開示の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard"> - セットアップ ウィザードでの権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi"> - Wi-Fi での権限昇格の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle"> - Bouncy Castle での情報開示の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager"> - SyncManager でのサービスの拒否の脆弱性 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels"> - Nexus カーネルの攻撃対象領域の削減 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers"> - 一般的な質問と回答 - </a> - </li> - </ol> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions"> - 改訂 - </a> - </li> - </ol> - </div> - </div> - <p> - <em> - 2016 年 1 月 4 日公開 | 2016 年 1 月 6 日更新 - </em> - </p> <p> Android のセキュリティに関する月例情報公開の一環として、Nexus 端末に対するセキュリティ アップデートを無線(OTA)アップデートで配信しました。また、Nexus ファームウェア イメージも <a href="https://developers.google.com/android/nexus/images"> @@ -367,13 +244,9 @@ page.title=Nexus のセキュリティに関する公開情報 - 2016 年 1 月 </li> <li> Tencent KEEN lab( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> )の Sen Nie( - <a href="https://twitter.com/@nforest_"> - @nforest_ - </a> + <a href="https://twitter.com/@nforest_"> @nforest_ </a> )と jfang: CVE-2015-6637 </li> <li> @@ -397,9 +270,7 @@ page.title=Nexus のセキュリティに関する公開情報 - 2016 年 1 月 </li> <li> Gal Beniamini( - <a href="https://twitter.com/@laginimaineb"> - @laginimaineb - </a> + <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a> 、 <a href="http://bits-please.blogspot.com/"> http://bits-please.blogspot.com @@ -1094,11 +965,3 @@ page.title=Nexus のセキュリティに関する公開情報 - 2016 年 1 月 2016 年 1 月 6 日: 公開情報を改訂し AOSP リンクを追加 </li> </ul> - </div> - <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement"> - <div class="layout-content-col col-9" style="padding-top:4px"> - </div> - <div class="paging-links layout-content-col col-4"> - </div> - </div> -</div> diff --git a/src-intl/ko_ALL/security/bulletin/2015-12-01.jd b/src-intl/ko_ALL/security/bulletin/2015-12-01.jd index e77ce355..902a7531 100644 --- a/src-intl/ko_ALL/security/bulletin/2015-12-01.jd +++ b/src-intl/ko_ALL/security/bulletin/2015-12-01.jd @@ -23,149 +23,6 @@ page.title=Nexus 보안 게시판 - 2015년 12월 </div> </div> -<div id="jd-content"> - <div class="jd-descr" itemprop="articleBody"> - <!-- - Copyright 2015 The Android Open Source Project - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. ---> - <div id="qv-wrapper"> - <div id="qv"> - <h2> - 이 문서에서 다루는 내용 - </h2> - <ol id="auto-toc"> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary"> - 보안 취약성 요약 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations"> - 완화 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements"> - 사사 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details"> - 보안 취약성 세부정보 - </a> - </li> - <ol> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver"> - 미디어 서버의 원격 코드 실행 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia"> - Skia의 원격 코드 실행 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel"> - 커널의 권한 승격 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver"> - 디스플레이 드라이버의 원격 코드 실행 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth"> - 블루투스의 원격 코드 실행 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright"> - libstagefright의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui"> - SystemUI의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library"> - 기본 프레임워크 라이브러리의 정보 공개 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi"> - Wi-Fi의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server"> - 시스템 서버의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright"> - libstagefright의 정보 공개 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio"> - 오디오의 정보 공개 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework"> - 미디어 프레임워크의 정보 공개 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi"> - Wi-Fi의 정보 공개 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19"> - 시스템 서버의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui"> - SystemUI의 정보 공개 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers"> - 일반적인 질문 및 답변 - </a> - </li> - </ol> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions"> - 버전 - </a> - </li> - </ol> - </div> - </div> - <p> - <em> - 2015년 12월 7일 게시됨 | 2015년 12월 22일 업데이트됨 - </em> - </p> <p> Google의 Android 보안 게시판 월간 출시 과정의 일환으로 무선 업데이트를 통해 Nexus 기기에 대한 보안 업데이트가 출시되었습니다. @@ -467,13 +324,9 @@ CVE-2015-6619, CVE-2015-6633, CVE-2015-6634 KeenTeam </a> ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> )의 Flanker( - <a href="https://twitter.com/flanker_hqd"> - @flanker_hqd - </a> + <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a> ): CVE-2015-6620 </li> <li> @@ -481,16 +334,12 @@ CVE-2015-6619, CVE-2015-6633, CVE-2015-6634 Qihoo 360 Technology Co.Ltd </a> 의 Guang Gong(龚广)( - <a href="https://twitter.com/oldfresher"> - @oldfresher - </a> + <a href="https://twitter.com/oldfresher"> @oldfresher </a> , higongguang@gmail.com): CVE-2015-6626 </li> <li> EmberMitre Ltd의 Mark Carter( - <a href="https://twitter.com/hanpingchinese"> - @hanpingchinese - </a> + <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a> ): CVE-2015-6630 </li> <li> @@ -511,17 +360,11 @@ CVE-2015-6619, CVE-2015-6633, CVE-2015-6634 KeenTeam </a> ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> )의 Qidan He( - <a href="https://twitter.com/flanker_hqd"> - @flanker_hqd - </a> + <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a> ), Marco Grassi( - <a href="https://twitter.com/marcograss"> - @marcograss - </a> + <a href="https://twitter.com/marcograss"> @marcograss </a> ): CVE-2015-6622 </li> <li> @@ -529,9 +372,7 @@ CVE-2015-6619, CVE-2015-6633, CVE-2015-6634 </li> <li> 아르헨티나 부에노스아이레스 Fundación Dr. Manuel Sadosky, Programa STIC의 Joaquín Rinaudo( - <a href="https://twitter.com/xeroxnir"> - @xeroxnir - </a> + <a href="https://twitter.com/xeroxnir"> @xeroxnir </a> ): CVE-2015-6631 </li> </ul> @@ -1630,11 +1471,3 @@ libstagefright의 정보 공개 취약성이 있습니다. 이 문제는 2015년 12월 22일: 사사 섹션에 누락된 크레딧 추가됨 </li> </ul> - </div> - <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement"> - <div class="layout-content-col col-9" style="padding-top:4px"> - </div> - <div class="paging-links layout-content-col col-4"> - </div> - </div> -</div> diff --git a/src-intl/ko_ALL/security/bulletin/2016-01-01.jd b/src-intl/ko_ALL/security/bulletin/2016-01-01.jd index 931b68c4..07574abd 100644 --- a/src-intl/ko_ALL/security/bulletin/2016-01-01.jd +++ b/src-intl/ko_ALL/security/bulletin/2016-01-01.jd @@ -23,129 +23,6 @@ page.title=Nexus 보안 게시판 - 2016년 1월 </div> </div> -<div id="jd-content"> - <div class="jd-descr" itemprop="articleBody"> - <!-- - Copyright 2016 The Android Open Source Project - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. ---> - <div id="qv-wrapper"> - <div id="qv"> - <h2> - 이 문서에서 다루는 내용 - </h2> - <ol id="auto-toc"> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary"> - 보안 취약성 요약 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations"> - 완화 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements"> - 사사 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details"> - 보안 취약성 세부정보 - </a> - </li> - <ol> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver"> - 미디어 서버의 원격 코드 실행 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver"> - misc-sd 드라이버의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver"> - Imagination Technologies 드라이버의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone"> - Trustzone의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel"> - 커널의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth"> - 블루투스의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel"> - 커널의 정보 공개 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard"> - 설치 마법사의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi"> - Wi-Fi의 권한 승격 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle"> - Bouncy Castle의 정보 공개 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager"> - SyncManager의 서비스 거부(DoS) 취약성 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels"> - Nexus 커널의 공격 범위 축소 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers"> - 일반적인 질문 및 답변 - </a> - </li> - </ol> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions"> - 버전 - </a> - </li> - </ol> - </div> - </div> - <p> - <em> - 2016년 1월 4일 게시됨 | 2016년 1월 6일 업데이트됨 - </em> - </p> <p> Google의 Android 보안 게시판 월간 출시 과정의 일환으로 무선 업데이트를 통해 Nexus 기기에 대한 보안 업데이트가 출시되었습니다. @@ -392,13 +269,9 @@ Google Play 외부에서 애플리케이션을 설치하는 사용자를 보호 </li> <li> KEEN lab, Tencent( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> )의 Sen Nie( - <a href="https://twitter.com/@nforest_"> - @nforest_ - </a> + <a href="https://twitter.com/@nforest_"> @nforest_ </a> ), jfang: CVE-2015-6637 </li> <li> @@ -422,9 +295,7 @@ Google Play 외부에서 애플리케이션을 설치하는 사용자를 보호 </li> <li> Gal Beniamini( - <a href="https://twitter.com/@laginimaineb"> - @laginimaineb - </a> + <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a> , <a href="http://bits-please.blogspot.com/"> http://bits-please.blogspot.com @@ -1167,11 +1038,3 @@ Android 6.0 이상에서 해결됩니다. 보안 패치 수준을 확인하는 2016년 1월 6일: 게시판이 수정되어 AOSP 링크 포함됨 </li> </ul> - </div> - <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement"> - <div class="layout-content-col col-9" style="padding-top:4px"> - </div> - <div class="paging-links layout-content-col col-4"> - </div> - </div> -</div> diff --git a/src-intl/ru_ALL/security/bulletin/2015-12-01.jd b/src-intl/ru_ALL/security/bulletin/2015-12-01.jd index d6cc7147..a1e0effc 100644 --- a/src-intl/ru_ALL/security/bulletin/2015-12-01.jd +++ b/src-intl/ru_ALL/security/bulletin/2015-12-01.jd @@ -23,149 +23,6 @@ page.title=Бюллетень по безопасности Nexus – дека </div> </div> -<div id="jd-content"> - <div class="jd-descr" itemprop="articleBody"> - <!-- - Copyright 2015 The Android Open Source Project - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. ---> - <div id="qv-wrapper"> - <div id="qv"> - <h2> - В этом документе - </h2> - <ol id="auto-toc"> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary"> - Перечень уязвимостей - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations"> - Предотвращение атак - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements"> - Благодарности - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details"> - Описание уязвимостей - </a> - </li> - <ol> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver"> - Удаленное выполнение кода через mediaserver - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia"> - Удаленное выполнение кода через Skia - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel"> - Повышение привилегий через ядро - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver"> - Удаленное выполнение кода через драйверы экрана - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth"> - Удаленное выполнение кода через Bluetooth - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright"> - Повышение привилегий через libstagefright - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui"> - Повышение привилегий через SystemUI - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library"> - Раскрытие информации через библиотеку фреймворков Android - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi"> - Повышение привилегий через Wi-Fi - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server"> - Повышение привилегий через SystemServer - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright"> - Раскрытие информации через libstagefright - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio"> - Раскрытие информации через Audio - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework"> - Раскрытие информации через Media Framework - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi"> - Раскрытие информации через Wi-Fi - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19"> - Повышение привилегий через SystemServer - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui"> - Раскрытие информации через SystemUI - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers"> - Часто задаваемые вопросы - </a> - </li> - </ol> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions"> - Версии - </a> - </li> - </ol> - </div> - </div> - <p> - <em> - Опубликовано 7 декабря 2015 г. | Обновлено 22 декабря 2015 г. - </em> - </p> <p> К выходу ежемесячного бюллетеня о безопасности Android мы выпустили автоматическое обновление системы безопасности для устройств Nexus @@ -466,24 +323,18 @@ CVE-2015-6634. </li> <li> Флэнкер ( - <a href="https://twitter.com/flanker_hqd"> - @flanker_hqd - </a> + <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a> ) из <a href="http://k33nteam.org/"> KeenTeam </a> ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> ): CVE-2015-6620. </li> <li> Гуан Гун (龚广) ( - <a href="https://twitter.com/oldfresher"> - @oldfresher - </a> + <a href="https://twitter.com/oldfresher"> @oldfresher </a> , higongguang@gmail.com) из <a href="http://www.360.cn/"> Qihoo 360 @@ -493,9 +344,7 @@ Technology Co.Ltd </li> <li> Марк Картер ( - <a href="https://twitter.com/hanpingchinese"> - @hanpingchinese - </a> + <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a> ) из EmberMitre Ltd: CVE-2015-6630. </li> <li> @@ -513,21 +362,15 @@ Technology Co.Ltd </li> <li> Цидань Хэ ( - <a href="https://twitter.com/flanker_hqd"> - @flanker_hqd - </a> + <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a> ) и Марко Грасси ( - <a href="https://twitter.com/marcograss"> - @marcograss - </a> + <a href="https://twitter.com/marcograss"> @marcograss </a> ) из <a href="http://k33nteam.org/"> KeenTeam </a> ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> ): CVE-2015-6622. </li> <li> @@ -535,9 +378,7 @@ Technology Co.Ltd </li> <li> Жуакин Ринауду ( - <a href="https://twitter.com/xeroxnir"> - @xeroxnir - </a> + <a href="https://twitter.com/xeroxnir"> @xeroxnir </a> ), участник Программы безопасности ИКТ Фонда доктора Мануэля Садоски, Буэнос-Айрес, Аргентина: CVE-2015-6631. </li> @@ -1652,11 +1493,3 @@ Bluetooth-модема), то злоумышленник может выполн 22 декабря 2015 года. Добавлены благодарности. </li> </ul> - </div> - <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement"> - <div class="layout-content-col col-9" style="padding-top:4px"> - </div> - <div class="paging-links layout-content-col col-4"> - </div> - </div> -</div> diff --git a/src-intl/ru_ALL/security/bulletin/2016-01-01.jd b/src-intl/ru_ALL/security/bulletin/2016-01-01.jd index 4c9bd5f6..8df53204 100644 --- a/src-intl/ru_ALL/security/bulletin/2016-01-01.jd +++ b/src-intl/ru_ALL/security/bulletin/2016-01-01.jd @@ -23,129 +23,6 @@ page.title=Бюллетень по безопасности Nexus – янва </div> </div> -<div id="jd-content"> - <div class="jd-descr" itemprop="articleBody"> - <!-- - Copyright 2016 The Android Open Source Project - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. ---> - <div id="qv-wrapper"> - <div id="qv"> - <h2> - В этом документе - </h2> - <ol id="auto-toc"> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary"> - Перечень уязвимостей - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations"> - Предотвращение атак - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements"> - Благодарности - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details"> - Описание уязвимостей - </a> - </li> - <ol> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver"> - Удаленное выполнение кода через mediaserver - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver"> - Повышение привилегий через драйвер misc-sd - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver"> - Повышение привилегий через драйвер Imagination Technologies - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone"> - Повышение привилегий через Trustzone - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel"> - Повышение привилегий через ядро - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth"> - Повышение привилегий через Bluetooth - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel"> - Раскрытие информации через ядро - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard"> - Повышение привилегий через мастер настройки - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi"> - Повышение привилегий через Wi-Fi - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle"> - Раскрытие информации через Bouncy Castle - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager"> - Отказ в обслуживании в SyncManager - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels"> - Снижение вероятности атаки в ядрах устройств Nexus - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers"> - Часто задаваемые вопросы - </a> - </li> - </ol> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions"> - Версии - </a> - </li> - </ol> - </div> - </div> - <p> - <em> - Опубликовано 4 января 2016 г. | Обновлено 6 января 2016 г. - </em> - </p> <p> К выходу ежемесячного бюллетеня о безопасности Android мы выпустили автоматическое обновление системы безопасности для устройств Nexus @@ -395,13 +272,9 @@ SafetyNet, помогают снизить вероятность атак на </li> <li> Сен Ние ( - <a href="https://twitter.com/@nforest_"> - @nforest_ - </a> + <a href="https://twitter.com/@nforest_"> @nforest_ </a> ) и jfang из KEEN lab, Tencent ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> ): CVE-2015-6637. </li> @@ -426,9 +299,7 @@ CVE-2015-6637. </li> <li> Гэл Бениамини ( - <a href="https://twitter.com/@laginimaineb"> - @laginimaineb - </a> + <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a> , <a href="http://bits-please.blogspot.com/"> http://bits-please.blogspot.com @@ -1191,11 +1062,3 @@ Trustzone. Уязвимости присвоен критический уров 6 января 2016 года. Добавлены ссылки на AOSP. </li> </ul> - </div> - <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement"> - <div class="layout-content-col col-9" style="padding-top:4px"> - </div> - <div class="paging-links layout-content-col col-4"> - </div> - </div> -</div> diff --git a/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd b/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd index 19fd79b8..3a05773e 100644 --- a/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd +++ b/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd @@ -23,149 +23,6 @@ page.title=Nexus 安全公告 - 2015 年 12 月 </div> </div> -<div id="jd-content"> - <div class="jd-descr" itemprop="articleBody"> - <!-- - Copyright 2015 The Android Open Source Project - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. ---> - <div id="qv-wrapper"> - <div id="qv"> - <h2> - 本文内容 - </h2> - <ol id="auto-toc"> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary"> - 安全漏洞摘要 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations"> - 缓解措施 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements"> - 致谢 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details"> - 安全漏洞详情 - </a> - </li> - <ol> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver"> - Mediaserver 中的远程代码执行漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia"> - Skia 中的远程代码执行漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel"> - 内核中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver"> - 显卡驱动程序中的远程代码执行漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth"> - 蓝牙中的远程代码执行漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright"> - libstagefright 中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui"> - SystemUI 中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library"> - Native Frameworks Library 中的信息披露漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi"> - WLAN 中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server"> - 系统服务器中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright"> - libstagefright 中的信息披露漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio"> - 音频中的信息披露漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework"> - 媒体框架中的信息披露漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi"> - WLAN 中的信息披露漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19"> - 系统服务器中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui"> - SystemUI 中的信息披露漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers"> - 常见问题和解答 - </a> - </li> - </ol> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions"> - 修订版本 - </a> - </li> - </ol> - </div> - </div> - <p> - <em> - 发布时间:2015 年 12 月 7 日 | 更新时间:2015 年 12 月 22 日 - </em> - </p> <p> 在每月发布 Android 安全公告的过程中,我们都会通过无线 (OTA) 更新的方式发布针对 Nexus 设备的安全更新。我们还会在 <a href="https://developers.google.com/android/nexus/images"> @@ -440,13 +297,9 @@ page.title=Nexus 安全公告 - 2015 年 12 月 碁震安全研究团队 </a> ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> ) 的 Flanker ( - <a href="https://twitter.com/flanker_hqd"> - @flanker_hqd - </a> + <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a> ):CVE-2015-6620 </li> <li> @@ -454,16 +307,12 @@ page.title=Nexus 安全公告 - 2015 年 12 月 奇虎 360 科技有限公司 </a> 的龚广( - <a href="https://twitter.com/oldfresher"> - @oldfresher - </a> + <a href="https://twitter.com/oldfresher"> @oldfresher </a> 、higongguang@gmail.com):CVE-2015-6626 </li> <li> EmberMitre Ltd 的 Mark Carter ( - <a href="https://twitter.com/hanpingchinese"> - @hanpingchinese - </a> + <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a> ):CVE-2015-6630 </li> <li> @@ -484,17 +333,11 @@ page.title=Nexus 安全公告 - 2015 年 12 月 碁震安全研究团队 </a> ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> ) 的 Qidan He ( - <a href="https://twitter.com/flanker_hqd"> - @flanker_hqd - </a> + <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a> ) 和 Marco Grassi ( - <a href="https://twitter.com/marcograss"> - @marcograss - </a> + <a href="https://twitter.com/marcograss"> @marcograss </a> ):CVE-2015-6622 </li> <li> @@ -502,9 +345,7 @@ page.title=Nexus 安全公告 - 2015 年 12 月 </li> <li> 阿根廷布宜诺斯艾利斯 Dr. Manuel Sadosky 基金会 Programa STIC 的 Joaquín Rinaudo ( - <a href="https://twitter.com/xeroxnir"> - @xeroxnir - </a> + <a href="https://twitter.com/xeroxnir"> @xeroxnir </a> ):CVE-2015-6631 </li> </ul> @@ -1537,11 +1378,3 @@ page.title=Nexus 安全公告 - 2015 年 12 月 2015 年 12 月 22 日:在“致谢”部分新添了遗漏的内容。 </li> </ul> - </div> - <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement"> - <div class="layout-content-col col-9" style="padding-top:4px"> - </div> - <div class="paging-links layout-content-col col-4"> - </div> - </div> -</div> diff --git a/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd b/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd index 158bbc8a..c00c665c 100644 --- a/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd +++ b/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd @@ -16,6 +16,7 @@ page.title=Nexus 安全公告 - 2016 年 1 月 See the License for the specific language governing permissions and limitations under the License. --> + <div id="qv-wrapper"> <div id="qv"> <ol id="auto-toc"> @@ -23,129 +24,6 @@ page.title=Nexus 安全公告 - 2016 年 1 月 </div> </div> -<div id="jd-content"> - <div class="jd-descr" itemprop="articleBody"> - <!-- - Copyright 2016 The Android Open Source Project - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. ---> - <div id="qv-wrapper"> - <div id="qv"> - <h2> - 本文内容 - </h2> - <ol id="auto-toc"> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary"> - 安全漏洞摘要 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations"> - 缓解措施 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements"> - 致谢 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details"> - 安全漏洞详情 - </a> - </li> - <ol> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver"> - Mediaserver 中的远程代码执行漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver"> - misc-sd 驱动程序中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver"> - Imagination Technologies 驱动程序中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone"> - TrustZone 中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel"> - 内核中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth"> - 蓝牙中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel"> - 内核中的信息披露漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard"> - 设置向导中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi"> - WLAN 中的提权漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle"> - Bouncy Castle 中的信息披露漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager"> - SyncManager 中的拒绝服务漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels"> - 减少 Nexus 内核的受攻击面 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers"> - 常见问题和解答 - </a> - </li> - </ol> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions"> - 修订版本 - </a> - </li> - </ol> - </div> - </div> - <p> - <em> - 发布时间:2016 年 1 月 4 日 | 更新时间:2016 年 1 月 6 日 - </em> - </p> <p> 在每月发布 Android 安全公告的过程中,我们都会通过无线 (OTA) 更新的方式发布针对 Nexus 设备的安全更新。我们还会在 <a href="https://developers.google.com/android/nexus/images"> @@ -367,13 +245,9 @@ page.title=Nexus 安全公告 - 2016 年 1 月 </li> <li> 腾讯 KEEN 实验室 ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> ) 的 Sen Nie ( - <a href="https://twitter.com/@nforest_"> - @nforest_ - </a> + <a href="https://twitter.com/@nforest_"> @nforest_ </a> ) 和 jfang:CVE-2015-6637 </li> <li> @@ -397,9 +271,7 @@ page.title=Nexus 安全公告 - 2016 年 1 月 </li> <li> Gal Beniamini ( - <a href="https://twitter.com/@laginimaineb"> - @laginimaineb - </a> + <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a> 、 <a href="http://bits-please.blogspot.com/"> http://bits-please.blogspot.com @@ -1094,11 +966,3 @@ page.title=Nexus 安全公告 - 2016 年 1 月 2016 年 1 月 6 日:修订了公告,添加 AOSP 链接。 </li> </ul> - </div> - <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement"> - <div class="layout-content-col col-9" style="padding-top:4px"> - </div> - <div class="paging-links layout-content-col col-4"> - </div> - </div> -</div> diff --git a/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd b/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd index d4dc03d2..e05b38c2 100644 --- a/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd +++ b/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd @@ -23,149 +23,6 @@ page.title=Nexus 安全性公告 - 2015 年 12 月 </div> </div> -<div id="jd-content"> - <div class="jd-descr" itemprop="articleBody"> - <!-- - Copyright 2015 The Android Open Source Project - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. ---> - <div id="qv-wrapper"> - <div id="qv"> - <h2> - 本文內容 - </h2> - <ol id="auto-toc"> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary"> - 安全性漏洞摘要 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations"> - 因應措施 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements"> - 特別銘謝 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details"> - 安全性漏洞詳情 - </a> - </li> - <ol> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver"> - 媒體伺服器中的遠端程式碼執行漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia"> - Skia 中的遠端程式碼執行漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel"> - 核心中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver"> - 顯示器驅動程式中的遠端程式碼執行漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth"> - 藍牙中的遠端程式碼執行漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright"> - libstagefright 中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui"> - SystemUI 中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library"> - 原生架構程式庫中的資訊外洩漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi"> - Wi-Fi 中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server"> - 系統伺服器中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright"> - libstagefright 中的資訊外洩漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio"> - 音訊中的資訊外洩漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework"> - 媒體架構中的資訊外洩漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi"> - Wi-Fi 中的資訊外洩漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19"> - 系統伺服器中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui"> - SystemUI 中的資訊外洩漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers"> - 常見問題與解答 - </a> - </li> - </ol> - <li> - <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions"> - 修訂版本 - </a> - </li> - </ol> - </div> - </div> - <p> - <em> - 發佈日期:2015 年 12 月 7 日 | 更新日期:2015 年 12 月 22 日 - </em> - </p> <p> Google 已透過 Android 安全性公佈欄每月公告程序中的無線 (OTA) 更新, 發佈 Nexus 裝置的安全性更新。 @@ -462,13 +319,9 @@ CVE-2015-6619、CVE-2015-6633、CVE-2015-6634 KeenTeam </a> ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam">@K33nTeam </a> ) 的 Flanker ( - <a href="https://twitter.com/flanker_hqd"> - @flanker_hqd - </a> + <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a> ):CVE-2015-6620 </li> <li> @@ -476,17 +329,12 @@ CVE-2015-6619、CVE-2015-6633、CVE-2015-6634 奇虎 360 科技有限公司 </a> 的 Guang Gong (龔廣) ( - <a href="https://twitter.com/oldfresher"> - @oldfresher - </a> + <a href="https://twitter.com/oldfresher">@oldfresher </a> ,higongguang@gmail.com):CVE-2015-6626 </li> <li> EmberMitre Ltd 的 Mark Carter ( - <a href="https://twitter.com/hanpingchinese"> - @hanpingchinese - </a> - ):CVE-2015-6630 + <a href="https://twitter.com/hanpingchinese">@hanpingchinese </a>):CVE-2015-6630 </li> <li> Michał Bednarski ( @@ -506,17 +354,11 @@ CVE-2015-6619、CVE-2015-6633、CVE-2015-6634 KeenTeam </a> ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam">@K33nTeam</a> ) 的 Qidan He ( - <a href="https://twitter.com/flanker_hqd"> - @flanker_hqd - </a> + <a href="https://twitter.com/flanker_hqd">@flanker_hqd</a> ) 和 Marco Grassi ( - <a href="https://twitter.com/marcograss"> - @marcograss - </a> + <a href="https://twitter.com/marcograss">@marcograss</a> ):CVE-2015-6622 </li> <li> @@ -525,9 +367,7 @@ CVE-2015-6619、CVE-2015-6633、CVE-2015-6634 <li> 阿根廷布宜諾斯艾利斯 Dr. Manuel Sadosky 基金會 Programa STIC 的 Joaquín Rinaudo ( - <a href="https://twitter.com/xeroxnir"> - @xeroxnir - </a> + <a href="https://twitter.com/xeroxnir"> @xeroxnir </a> ):CVE-2015-6631 </li> </ul> @@ -1635,11 +1475,3 @@ CVE-2015-6619、CVE-2015-6633、CVE-2015-6634 2015 年 12 月 22 日:在「特別銘謝」部分新增遺漏的銘謝對象。 </li> </ul> - </div> - <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement"> - <div class="layout-content-col col-9" style="padding-top:4px"> - </div> - <div class="paging-links layout-content-col col-4"> - </div> - </div> -</div> diff --git a/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd b/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd index 4bd8f71c..9d09d4c8 100644 --- a/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd +++ b/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd @@ -23,129 +23,6 @@ page.title=Nexus 安全性公告 - 2016 年 1 月 </div> </div> -<div id="jd-content"> - <div class="jd-descr" itemprop="articleBody"> - <!-- - Copyright 2016 The Android Open Source Project - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. ---> - <div id="qv-wrapper"> - <div id="qv"> - <h2> - 本文內容 - </h2> - <ol id="auto-toc"> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary"> - 安全性漏洞摘要 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations"> - 因應措施 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements"> - 特別銘謝 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details"> - 安全性漏洞詳情 - </a> - </li> - <ol> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver"> - 媒體伺服器中的遠端程式碼執行漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver"> - misc-sd 驅動程式中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver"> - Imagination Technologies 驅動程式中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone"> - Trustzone 中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel"> - 核心中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth"> - 藍牙中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel"> - 核心中的資訊外洩漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard"> - 設定精靈中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi"> - Wi-Fi 中的權限升級漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle"> - Bouncy Castle 中的資訊外洩漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager"> - SyncManager 中的拒絕服務漏洞 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels"> - 縮減 Nexus 核心的受攻擊面 - </a> - </li> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers"> - 常見問題與解答 - </a> - </li> - </ol> - <li> - <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions"> - 修訂版本 - </a> - </li> - </ol> - </div> - </div> - <p> - <em> - 發佈日期:2016 年 1 月 4 日 | 更新日期:2016 年 1 月 6 日 - </em> - </p> <p> Google 已透過 Android 安全性公佈欄每月公告程序中的無線 (OTA) 更新, 發佈 Nexus 裝置的安全性更新。 @@ -390,13 +267,9 @@ CVE-2015-6636、CVE-2015-6617 </li> <li> 騰訊 ( - <a href="https://twitter.com/k33nteam"> - @K33nTeam - </a> + <a href="https://twitter.com/k33nteam"> @K33nTeam </a> ) KEEN 實驗室的 Sen Nie ( - <a href="https://twitter.com/@nforest_"> - @nforest_ - </a> + <a href="https://twitter.com/@nforest_"> @nforest_ </a> ) 和 jfang:CVE-2015-6637 </li> <li> @@ -420,9 +293,7 @@ CVE-2015-6636、CVE-2015-6617 </li> <li> Gal Beniamini ( - <a href="https://twitter.com/@laginimaineb"> - @laginimaineb - </a> + <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a> , <a href="http://bits-please.blogspot.com/"> http://bits-please.blogspot.com @@ -1183,11 +1054,3 @@ IPC 與 Android 的應用程式生命週期並不相容,原因是 2016 年 1 月 6 日:修訂公告,加入 AOSP 連結。 </li> </ul> - </div> - <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement"> - <div class="layout-content-col col-9" style="padding-top:4px"> - </div> - <div class="paging-links layout-content-col col-4"> - </div> - </div> -</div> |