{"id":2951,"date":"2023-03-20T01:33:20","date_gmt":"2023-03-19T17:33:20","guid":{"rendered":"http:\/\/0.0.0.0:8801\/?p=2951"},"modified":"2023-03-28T01:35:45","modified_gmt":"2023-03-27T17:35:45","slug":"google-pixel-%e6%89%8b%e6%a9%9f%e9%81%ad%e7%99%bc%e7%8f%be%e5%a4%9a%e9%81%94-120-%e5%80%8b%e8%b3%87%e5%ae%89%e6%bc%8f%e6%b4%9e","status":"publish","type":"post","link":"https:\/\/aict.nkust.edu.tw\/digitrans\/?p=2951","title":{"rendered":"Google Pixel \u624b\u6a5f\u906d\u767c\u73fe\u591a\u9054 120 \u500b\u8cc7\u5b89\u6f0f\u6d1e"},"content":{"rendered":"\n<p>\u767c\u5e03\u55ae\u4f4d:TWCERT\/CC <br>\u66f4\u65b0\u65e5\u671f:2023-03-20<\/p>\n\n\n\n<p>\u64da Cybersecurityhelp \u7db2\u7ad9\u8fd1\u671f\u767c\u5e03\u7684 Google Pixel \u5b89\u5168\u6f0f\u6d1e\u901a\u5831\u6307\u51fa\uff0c\u8fd1\u671f Google Pixel \u7cfb\u5217\u624b\u6a5f\u5171\u767c\u73fe\u591a\u9054 120 \u500b\u8cc7\u5b89\u6f0f\u6d1e\u3002<\/p>\n\n\n\n<p>\u9019\u6279\u591a\u9054 120 \u500b\u8cc7\u5b89\u6f0f\u6d1e\u4e2d\uff0c\u4ee5\u5176\u5371\u96aa\u7a0b\u5ea6\u8a55\u7d1a\u4f86\u8aaa\uff0c\u4e26\u6c92\u6709\u88ab\u5217\u70ba\u300c\u56b4\u91cd\u300d(critical) \u7b49\u7d1a\u7684\u8cc7\u5b89\u6f0f\u6d1e\uff1b\u5217\u70ba\u300c\u9ad8\u300d(high) \u7b49\u7d1a\u7684\u6709 7 \u500b\u3001\u300c\u4e2d\u300d(medium) \u7684\u6709 1 \u500b\uff0c\u5176\u9918\u7684\u90fd\u5c6c\u65bc\u300c\u4f4e\u300d(low) \u5371\u96aa\u7b49\u7d1a\u8cc7\u5b89\u6f0f\u6d1e\u3002<\/p>\n\n\n\n<p>\u5c6c\u65bc\u300c\u9ad8\u300d\u5371\u96aa\u7b49\u7d1a\u7684\u6709\u4ee5\u4e0b\u6578\u500b\u6f0f\u6d1e\u8f03\u503c\u5f97\u6ce8\u610f\uff1a<\/p>\n\n\n\n<p>CVE-2023-21054\uff1a\u672c\u6f0f\u6d1e\u5c6c\u65bc\u9060\u7aef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u6f0f\u6d1e\uff0c\u5b58\u65bc Pixel \u624b\u6a5f\u7684 Modem \u5b50\u5143\u4ef6\u672a\u80fd\u91dd\u5c0d\u8f38\u5165\u9032\u884c\u59a5\u5584\u6aa2\u67e5\uff1b\u99ed\u4fb5\u8005\u53ef\u8a98\u4f7f\u7528\u6236\u958b\u555f\u7279\u88fd\u6a94\u6848\u8a98\u767c\u6b64\u6f0f\u6d1e\uff0c\u9060\u7aef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u3002<br>CVE-2023-24033\uff1a\u672c\u6f0f\u6d1e\u548c\u4e0a\u500b\u6f0f\u6d1e\u540c\u6a23\u5c6c\u65bc\u9060\u7aef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u6f0f\u6d1e\uff0c\u5b58\u65bc Pixel \u624b\u6a5f\u7684 Modem \u5b50\u5143\u4ef6\u672a\u80fd\u91dd\u5c0d\u8f38\u5165\u9032\u884c\u59a5\u5584\u6aa2\u67e5\uff1b\u99ed\u4fb5\u8005\u53ef\u8a98\u4f7f\u7528\u6236\u958b\u555f\u7279\u88fd\u6a94\u6848\u8a98\u767c\u6b64\u6f0f\u6d1e\uff0c\u9060\u7aef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u3002<br>CVE-2023-21058\uff1a\u672c\u6f0f\u6d1e\u548c\u4e0a\u500b\u6f0f\u6d1e\u540c\u6a23\u5c6c\u65bc\u9060\u7aef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u6f0f\u6d1e\uff0c\u5b58\u65bc Pixel \u624b\u6a5f\u7684 Cellular \u97cc\u9ad4\u5b50\u5143\u4ef6\u672a\u80fd\u91dd\u5c0d\u8f38\u5165\u9032\u884c\u59a5\u5584\u6aa2\u67e5\uff1b\u99ed\u4fb5\u8005\u53ef\u8a98\u4f7f\u7528\u6236\u958b\u555f\u7279\u88fd\u6a94\u6848\u8a98\u767c\u6b64\u6f0f\u6d1e\uff0c\u9060\u7aef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u3002<br>CVE-2023-21057\uff1a\u672c\u6f0f\u6d1e\u548c CVE-2023-21058 \u540c\u6a23\u5b58\u65bc Pixel \u624b\u6a5f\u7684 Cellular \u97cc\u9ad4\u5b50\u5143\u4ef6\uff0c\u4ea6\u662f\u672a\u80fd\u91dd\u5c0d\u8f38\u5165\u9032\u884c\u59a5\u5584\u6aa2\u67e5\u7684\u6f0f\u6d1e\uff1b\u99ed\u4fb5\u8005\u53ef\u8a98\u4f7f\u7528\u6236\u958b\u555f\u7279\u88fd\u6a94\u6848\u8a98\u767c\u6b64\u6f0f\u6d1e\uff0c\u9060\u7aef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u3002<br>CVE-2023-42499\uff1a\u672c\u6f0f\u6d1e\u5b58\u65bc Pixel \u624b\u6a5f\u7684 modem \u5b50\u5143\u4ef6\uff0c\u4ea6\u662f\u672a\u80fd\u91dd\u5c0d\u8f38\u5165\u9032\u884c\u59a5\u5584\u6aa2\u67e5\u7684\u6f0f\u6d1e\uff1b\u99ed\u4fb5\u8005\u53ef\u8a98\u4f7f\u7528\u6236\u958b\u555f\u7279\u88fd\u6a94\u6848\u8a98\u767c\u6b64\u6f0f\u6d1e\uff0c\u9060\u7aef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u3002<br>CVE-2023-42498\uff1a\u672c\u6f0f\u6d1e\u5b58\u65bc Pixel \u624b\u6a5f\u7684 Cellular \u97cc\u9ad4\u5b50\u5143\u4ef6\u5167\uff0c\u540c\u6a23\u4e5f\u662f\u672a\u80fd\u91dd\u5c0d\u8f38\u5165\u9032\u884c\u59a5\u5584\u6aa2\u67e5\u7684\u6f0f\u6d1e\uff1b\u99ed\u4fb5\u8005\u53ef\u8a98\u4f7f\u7528\u6236\u958b\u555f\u7279\u88fd\u6a94\u6848\u8a98\u767c\u6b64\u6f0f\u6d1e\uff0c\u9060\u7aef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u3002<br>CVE-2023-43043\uff1a\u672c\u6f0f\u6d1e\u5c6c\u65bc parse.c \u548c\u5f0f\u4e2d\u7684\u6574\u6578\u6ea2\u4f4d\u932f\u8aa4\uff1b\u99ed\u4fb5\u8005\u53ef\u5c07\u7279\u88fd\u7684\u8cc7\u6599\u50b3\u5165\u8a72\u61c9\u7528\u7a0b\u5f0f\u5167\u8a98\u767c\u6b64\u6f0f\u6d1e\uff0c\u9060\u7aef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\uff0c\u4e26\u4e14\u5b8c\u5168\u63a7\u5236\u53d7\u5bb3\u88dd\u7f6e\u3002<\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a<a href=\"https:\/\/www.twcert.org.tw\/tw\/cp-104-7005-dff49-1.html\" data-type=\"URL\" data-id=\"https:\/\/www.twcert.org.tw\/tw\/cp-104-7005-dff49-1.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.twcert.org.tw\/tw\/cp-104-7005-dff49-1.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u767c\u5e03\u55ae\u4f4d:TWCERT\/CC \u66f4\u65b0\u65e5\u671f:2023-03-20 \u64da Cybersecurityhelp \u7db2\u7ad9\u8fd1\u671f\u767c\u5e03\u7684 Google Pixel \u5b89\u5168\u6f0f\u6d1e\u901a\u5831\u6307\u51fa\uff0c\u8fd1\u671f Google&hellip;<\/p>\n","protected":false},"author":9,"featured_media":2952,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[352],"tags":[204],"class_list":["post-2951","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-204"],"gutentor_comment":0,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/aict.nkust.edu.tw\/digitrans\/wp-content\/uploads\/2023\/03\/1562303201622475f6.png?fit=836%2C626&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/2951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2951"}],"version-history":[{"count":1,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/2951\/revisions"}],"predecessor-version":[{"id":2953,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/2951\/revisions\/2953"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/media\/2952"}],"wp:attachment":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}