summaryrefslogtreecommitdiffstats
path: root/core
Commit message (Collapse)AuthorAgeFilesLines
* Shorten the build fingerprintWolfgang Wiedmeyer2020-01-021-1/+1
| | | | | | | | | | It can exceed its maximum length for devices with longer codenames (e.g. espressowifi). PRODUCT_BRAND is set to "Android" which doesn't say much and TARGET_VENDOR_DEVICE_NAME should always have the same codename that is already set in the build target TARGET_VENDOR_PRODUCT_NAME, so no information is lost. Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* U-Boot and Xloader: use arm-none-eabi toolchainWolfgang Wiedmeyer2020-01-022-2/+2
| | | | Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* kernel: mkimage dependency for U-Boot kernelsWolfgang Wiedmeyer2020-01-021-1/+6
| | | | | | | | | | | | | | Based on Paul's Replicant 4.2 patch: commit 3e39ecabad250118c613b71e01738bb4c7a4d51c Author: Paul Kocialkowski <contact@paulk.fr> Date: Fri Apr 25 11:43:26 2014 +0200 kernel: mkimage dependency for U-Boot kernels Signed-off-by: Paul Kocialkowski <contact@paulk.fr> Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* bootloaderimage targetPaul Kocialkowski2020-01-022-0/+7
| | | | Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
* U-Boot taskPaul Kocialkowski2020-01-022-0/+57
| | | | Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
* kernel: Add support for the LOADADDR parameter.Denis 'GNUtoo' Carikli2020-01-021-1/+5
| | | | | | | | | | | | | | | | Without that fix we have: Kernel: arch/arm/boot/zImage is ready multiple (or no) load addresses: This is incompatible with uImages Specify LOADADDR on the commandline to build an uImage make[3]: *** [arch/arm/boot/uImage] Error 1 make[2]: *** [uImage] Error 2 make[1]: *** [sub-make] Error 2 make[1]: Leaving directory `/home/gnutoo/embedded/android/replicant-4.0/kernel/goldelico/gta04' make: *** [TARGET_KERNEL_BINARIES] Error 2 While building a recent kernel (3.10 based in that case). Signed-off-by: Denis 'GNUtoo' Carikli <GNUtoo@no-log.org>
* Enable -fstack-protector-strong for arm.Elliott Hughes2020-01-021-1/+1
| | | | | | | | | | | | | | | | | | | This results in nearly all functions with the possibility of stack corruption getting stack canaries, because it applies to any function taking a reference to the frame or with a local array rather than just the functions with arrays larger than 8 bytes. It was developed for use in Chrome (and Chrome OS) and has also been adopted by various other distributions (Arch, Fedora, Ubuntu, etc). The code size increase ranges from ~1.5% to ~2.5%, compared to ~0.3% to ~0.7% with the more conservative switch. The increase in the performance loss is usually minimal. The overall size increase once everything other than C and C++ code is taken into account is minimal, and it greatly improves the mitigation of stack buffer overflow vulnerabilities. https://lwn.net/Articles/584225/ Change-Id: Iccc20852db8a5e4dd9792f9da6d5e325fc59b0a5
* Add relocation packer as dependencyWolfgang Wiedmeyer2020-01-022-1/+2
| | | | | | Relocation packer is built from source. Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* Fix libs list for manifest mergerWolfgang Wiedmeyer2020-01-021-0/+4
| | | | | | Newer manifest merger expects colons instead of spaces. Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* keep up with latest manifest merger in DebianWolfgang Wiedmeyer2020-01-021-1/+1
| | | | Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* Standalone recovery kernel buildWolfgang Wiedmeyer2020-01-022-5/+46
| | | | | | Port of commit f6fe3cf5 from Replicant 4.2 Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* add dependencies to manifest mergerWolfgang Wiedmeyer2020-01-021-1/+1
| | | | | | sdklib and tools.common are needed from Debian Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* use manifest merger from /usrWolfgang Wiedmeyer2020-01-021-1/+1
| | | | It's now available in Debian Stretch
* Clang: use assembler from toolchain, not from systemWolfgang Wiedmeyer2020-01-021-1/+2
| | | | | | This fixes build errors with a more recent binutils. Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* clang: fix gcc install pathsWolfgang Wiedmeyer2020-01-021-4/+4
| | | | | | They changed in the latest gcc from 4.9 to 4.9.x Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* make tcclean target workWolfgang Wiedmeyer2020-01-021-6/+6
| | | | Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* add tcclean target to remove all toolchain build dirsWolfgang Wiedmeyer2020-01-021-1/+12
| | | | Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* don't add CyanogenMod's keys to PRODUCT_EXTRA_RECOVERY_KEYSWolfgang Wiedmeyer2020-01-021-4/+0
| | | | Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* proguard and emma.jar from GNU/Linux hostWolfgang Wiedmeyer2020-01-021-2/+2
| | | | Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* fix gcc tools pathWolfgang Wiedmeyer2020-01-022-6/+6
| | | | | | export androideabi arm toolchain path Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* use relocation packer from out dirWolfgang Wiedmeyer2020-01-021-1/+1
| | | | Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* always build llvm componentsWolfgang Wiedmeyer2020-01-021-3/+1
| | | | | | this way, the prebuilt ones from the sdk are not needed Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* use more prebuilt apps from the hostWolfgang Wiedmeyer2020-01-021-7/+4
| | | | | | | take flex, bison, yasm and findbugs from /usr/bin TODO: cleanup removal of analyzer Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* clang: fix linkingWolfgang Wiedmeyer2020-01-021-2/+11
| | | | Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* use the GNU/Linux Distribution's arm toolchain for the kernelWolfgang Wiedmeyer2020-01-021-4/+4
| | | | Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* clang: include extra system headersWolfgang Wiedmeyer2020-01-021-3/+6
| | | | Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* don't use the prebuilt host toolchainWolfgang Wiedmeyer2020-01-024-39/+21
| | | | | | | this is just an initial version various config parts need cleanup and more testing is necessary Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* Take the COPYING note from the smdk4412 kernel, so we don't depend on the ↵Wolfgang Wiedmeyer2020-01-021-1/+1
| | | | | | | | qemu kernel repo it shouldn't matter from which kernel repo the licence text is taken Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* change version strings to ReplicantWolfgang Wiedmeyer2020-01-022-2/+2
| | | | Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* fix pathsWolfgang Wiedmeyer2020-01-021-1/+1
| | | | | Change-Id: Iaafc283244ec47a0599c474a6a42efa4d87fa97c Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* Replicant SDK namePaul Kocialkowski2020-01-021-1/+1
| | | | | Change-Id: I3b4debf8f58f9dbc3b22aedb4df1402e04394227 Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
* X-Loader taskPaul Kocialkowski2020-01-022-0/+65
| | | | Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
* Bump Security Patch Level to 2019-04-01Tim Schumacher2019-08-191-1/+1
| | | | | | | | | | | | | | | | CVE-2019-2027 A-119120561 Crit Change 251187 CVE-2019-2028 A-120644655 Crit Change 254099 CVE-2019-2031 A-120502559 High Change 251188 CVE-2019-2034 A-122035770 High Change 251192 CVE-2019-2035 A-122320256 High Change 251191 CVE-2019-2038 A-121259048 High Change 251190 CVE-2019-2039 A-121260197 High Change 251189 CVE-2019-2029 A-120612744 Crit Change 251193 CVE-2019-2037 A-119870451 High Change 251194 Reference Version: 7.0 Change-Id: I258c7ac961dbc2281b01f4ecd69097e5e08d57b9
* Bump Security Patch Level to 2019-03-01Tim Schumacher2019-08-181-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CVE-2018-20346 A-121156452 High Change 254060/249486 CVE-2019-1985 A-118694079* High Change 246141 CVE-2019-2003 A-116321860 High Change 246849 CVE-2019-2004 A-115739809 High Change 246139 CVE-2019-1989 A-118399205 Crit. Change 246143 CVE-2019-1990 A-118453553 Crit. Change 246142 CVE-2019-2009 A-120665616 Crit. vulnerable feature missing CVE-2019-2010 A-118152591 High Change 246132 CVE-2019-2012 A-120497437 High Change 246131 CVE-2019-2013 A-120497583 High Change 246131 CVE-2019-2014 A-120499324 High Change 246138 CVE-2019-2015 A-120503926 High Change 246130 CVE-2019-2016 A-120664978 High Change 246129 CVE-2019-2017 A-121035711 High Change 246135 CVE-2018-9561 A-111660010[1] High Change 246134 CVE-2018-9561 A-111660010[2] High Change 246134 CVE-2018-9563 A-114237888[1] High Change 246134 CVE-2018-9563 A-114237888[2] High Change 246134 CVE-2018-9564 A-114238578[1] High Change 246134 CVE-2018-9564 A-114238578[2] High Change 246134 CVE-2019-2019 A-115635871 High Change 246136 CVE-2019-2020 A-116788646 High Change 246133 CVE-2019-2021 A-120428041 High Change 246137 CVE-2019-2022 A-120506143 High Change 246131 Reference version: 7.0 Change-Id: I3e73d75b38e88bfa649d2e960704cc4796f7b422
* Bump Security Patch Level to 2019-02-01Tim Schumacher2019-04-051-1/+1
| | | | | | | | | | | | | | | | | | CVE-2019-1987 A-118143775 [1] Crit. Dependency of [2] CVE-2019-1987 A-118143775 [2] Crit. Not applicable CVE-2017-17760 A-78029030* High Change 244765 CVE-2018-5268 A-78029634* High Change 244765 CVE-2018-5269 A-78029727* High Change 244765 CVE-2017-18009 A-78026242* Mod. Change 244765 CVE-2019-1991 A-110166268 Crit. Change 244753 CVE-2019-1992 A-116222069 Crit. Change 244755 CVE-2019-1995 A-32589229 [1] High Change 244756 CVE-2019-1995 A-32589229 [2] High Change 244757 CVE-2019-1997 A-117508900 High Change 244758 Reference Version: 7.0 Change-Id: Iac3b46a870f0a91900fcfe486e863ad1ff3466e6
* Bump Security Patch Level to 2019-01-01mse19692019-02-091-1/+1
| | | | | | | | | | | | | | | | | | CVE-2018-9583 A-112860487 Critical Change 240477 CVE-2018-9584 A-114047681 High Change 240469 CVE-2018-9585 A-117554809 High Change 240470 CVE-2018-9586 A-116754444 High Change 240472 CVE-2018-9587 A-113597344 High Change 240466 CVE-2018-9588 A-111450156 High Change 241258 CVE-2018-9589 A-111893132 High Change 240471 CVE-2018-9590 A-115900043 High Change 240476 CVE-2018-9591 A-116108738 High Change 240473 CVE-2018-9592 A-116319076 High Change 240474 CVE-2018-9593 A-116722267 High Change 240467 CVE-2018-9594 A-116791157 High Change 240468 Reference Version: 7.0 Change-Id: I36bce7d9c888275f57fe1b3145cf0acca050a5bd
* Bump Security Patch Level to 2018-12-01Tim Schumacher2019-02-021-1/+1
| | | | | | | | | | | | | | | | | CVE-2018-9548 A-112555574 High Change 239033 CVE-2018-9549 A-112160868 Critical Change 239038 CVE-2018-9552 A-113260892 Critical Change 239039 CVE-2018-9553 A-116615297 High No external/libvpx in M CVE-2018-9554 A-114770654 High No IMediaExtractor.cpp CVE-2018-9555 A-112321180 Critical No fn. l2c_lcc_proc_pdu CVE-2018-9557 A-35385357 High Not publicly available CVE-2018-9558 A-112161557 High Change 240414 CVE-2018-9559 A-112731440 High Change 239042 CVE-2018-9566 A-74249842 High Change 239041 Reference Version: 7.0 Change-Id: Ia9f18c3af1ab3e49d49da698bb64e0ea04c43607
* Bump Security Patch Level to 2018-11-01Tim Schumacher2019-02-021-1/+1
| | | | | | | | | | | | | CVE-2018-9524 A-34170870 High Change 239014 CVE-2018-9527 A-112159345 Critical Change 239022/239023 CVE-2018-9540 A-111450417 High Change 239019 CVE-2018-9542 A-111896861 High Change 239020 CVE-2018-9541 A-111450531 High Change 239020 CVE-2018-9523 A-112859604 High Change 239017 Reference Version: 7.0 Change-Id: I037aae401038123386b2a12531b5a04c773eb26b
* Bump Security Patch Level to 2018-10-01Tim Schumacher2019-02-021-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CVE-2018-9490 A-111274046[1] Critical Change 234634/234636 CVE-2018-9490 A-111274046[2] Critical CVE-2018-9491 A-111603051 High Change 234595 CVE-2018-9493 A-111085900[1] High CVE-2018-9493 A-111085900[2] High CVE-2018-9493 A-111085900[3] High CVE-2018-9452 A-78464361[1] Moderate Change 238851 CVE-2018-9452 A-78464361[2] Moderate Change 238850 CVE-2018-9497 A-74078669 Critical Change 234596 CVE-2018-9498 A-78354855 Critical CVE-2018-9499 A-79218474 High Change 234597 CVE-2017-13283 A-78526423 Critical Change 234598 CVE-2018-9504 A-110216176 Critical Change 234599 CVE-2018-9501 A-110034419 High CVE-2018-9502 A-111936792[1] High Change 234601 CVE-2018-9502 A-111936792[2] High Change 234603 CVE-2018-9502 A-111936792[3] High Change 234602 CVE-2018-9503 A-80432928[1] High Change 234601 CVE-2018-9503 A-80432928[2] High Change 234603 CVE-2018-9503 A-80432928[3] High Change 234602 CVE-2018-9505 A-110791536 High Change 234604 CVE-2018-9506 A-111803925 High Change 234605 CVE-2018-9507 A-111893951 High Change 234606 CVE-2018-9508 A-111936834 High Change 234607 CVE-2018-9509 A-111937027 High Change 234608 CVE-2018-9510 A-111937065 High Change 234609 Change-Id: Ibdf13709f48457970aed0fccbea1bb6f550c335e
* Bump Security Patch Level to 2018-09-01Tim Schumacher2018-11-171-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | CVE-2018-9466 A-62151041 High Change 234592 CVE-2018-9467 A-110955991 High Change 231177 CVE-2018-9470 A-78290481 High Already in fork/231223 CVE-2018-9471 A-77599679 High API not supported CVE-2018-9472 A-79662501 High Change 234592 CVE-2018-9474 A-77600398 High Change 231190 CVE-2018-9440 A-77823362[1] Moderate Change 231191 CVE-2018-9440 A-77823362[2] Moderate Change 231192 CVE-2018-9475 A-79266386 Critical Change 234582 CVE-2018-9478 A-79217522 Critical Change 231222 CVE-2018-9479 A-79217770 Critical Change 231222 CVE-2018-9456 A-78136869 High Change 231224 CVE-2018-9483 A-110216173 High Change 234583 CVE-2018-9484 A-79488381 High Change 231225 CVE-2018-9485 A-80261585 High Change 231226 CVE-2018-9486 A-80493272 High Change 231227 CVE-2018-9468 A-111084083 High Change 231229 Reference Version: 7.0 Change-Id: I031bf1f0b6415c8f186156c957661c548ffd08e2
* Bump Security Patch Level to 2018-08-01Tim Schumacher2018-09-291-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | CVE-2018-9445 A-80436257[1] High Change 223019 CVE-2018-9445 A-80436257[2] High Change 223020 CVE-2018-9451 A-79488511[1] High Change 223021 CVE-2018-9451 A-79488511[2] High Change 223022 CVE-2018-9444 A-63521984* High waiting for upstream CVE-2018-9437 A-78656554 High Change 223023 CVE-2018-9446 A-80145946 Critical Change 223028 CVE-2018-9450 A-79541338 Critical N/A CVE-2018-9459 A-66230183 High Change 223018 CVE-2018-9455 A-78136677 High Change 223029 CVE-2018-9436 A-79164722 High Change 223030 CVE-2018-9454 A-78286118 High Change 223030 CVE-2018-9453 A-78288378 High Change 223032 CVE-2018-9435 A-79591688 Moderate Change 223034 CVE-2018-9461 A-37629504 Moderate Change 223036 CVE-2018-9449 A-79884292 Moderate Change 223035 CVE-2018-9457 A-72872376 Moderate N/A CVE-2018-9441 A-74075873[1] Moderate Change 223033 CVE-2018-9441 A-74075873[2] Moderate Change 223031 CVE-2017-13322 A-67862398 Moderate Change 223056 CVE-2018-9447 A-79995313 Moderate Change 223057 Change-Id: Icc68f7061e41111d6740237a95539214dad0e51f
* build: use the system's ccache by defaultAnthony King2018-08-152-9/+20
| | | | | | | | | | | * ccache gets updated semi-frequently and some builders would like to be able to take advantage of new features without having to rely on the prebuilt version getting updated * If a build system has ccache installed already, use that version instead of the prebuilt Change-Id: I8988c8a25fab3694d84633f957c2b92ce84cf69e
* Bump Security Patch Level to 2018-07-01Tim Schumacher2018-08-021-1/+1
| | | | | | | | | | | | | | | | | | | | | Implemented Patches =================== CVE-2018-9412 A-78029004 High Change 220462 CVE-2018-9421 A-77237570 High Change 220464 CVE-2018-9365 A-74121126 Critical Change 220470 CVE-2018-9432 A-73173182 High Change 220468 CVE-2018-9420 A-77238656 High Change 220469 CVE-2018-9376 A-69981755 Moderate CVE-2018-9434 A-29833520 [1] Moderate Change 220466 CVE-2018-9434 A-29833520 [2] Moderate Change 220465 CVE-2018-9430 A-73963551 Moderate Change 220471 CVE-2018-9414 A-78787521 Moderate Change 220467 Skipped Patches =============== CVE-2018-9433 A-38196219* Critical Not publicly available Change-Id: I1963c50ef9679fc575b1186d5f074fa35dbe340a
* ota_from_target_files: Remove more device dependent argumentsAndreas Blaesius2018-06-191-4/+4
| | | | Change-Id: Ib23b8e2aa46d0ad37c51eb4c8f586b6047a9c0b0
* Bump security string to 2018-06-01MSe2018-06-191-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Implemented patches: ------------------------------------------------------ CVE-2018-9338 A-71361168 High Change 217098 CVE-2018-9340 A-71360999 High Change 217098 CVE-2018-9341 A-74016277 Critical Change 217099 CVE-2018-5146 A-77284393* Critical Change 217101 CVE-2018-9345 A-77238250 High Change 217102 CVE-2018-9346 A-77238762 High Change 217102 CVE-2018-9347 A-68664359 High Change 217103 CVE-2018-9348 A-68953854 High Change 217103 CVE-2018-9355 A-74016921 Critical Change 217104 CVE-2018-9356 A-74950468 Critical Change 217106 CVE-2018-9357 A-74947856 Critical Change 217107 CVE-2018-9358 A-73172115 High Change 217108 CVE-2018-9359 A-74196706 High Change 217109 CVE-2018-9360 A-74201143 High Change 217109 CVE-2018-9361 A-74202041 High Change 217109 CVE-2018-9362 A-72298611 High Change 217110 CVE-2018-9375 A-75298708 Moderate Change 217111 CVE-2018-9378 A-73126106 Moderate Change 217112 CVE-2018-9379 A-63766886[2] Moderate Change 217113/217115 CVE-2018-9349 A-72510002 High Change 217114 CVE-2018-9350 A-73552574 High Change 217116 CVE-2018-9351 A-73625898 High Change 217117 CVE-2018-9352 A-73965867[2] High Change 217118/217119 CVE-2018-9353 A-73965890 High Change 217120 CVE-2018-9354 A-74067957 High Change 217121 Not implemented: ------------------------------------------------------ CVE-2017-13230 A-65483665 Critical Already backported CVE-2018-9374 A-72710897 Moderate No Runtime Permissions CVE-2018-9377 A-64752751* Moderate not found CVE-2018-9382 A-35765136* Moderate not found Reference version: 6.0 Change-Id: I65056a115e1f209d41b942f43ef79a5af3c4678a
* set ro.adb.secure=1 for user buildsDaniel Micay2018-06-102-0/+5
| | | | | | | | | | | | In user builds, adb without authentication is always disabled. However, it doesn't work with the defaults because authentication doesn't work without having ro.adb.secure=1 set. It makes sense to offer builds with no adb but not builds with adb present in an unusable state (especially as the default). Bug: 22220212 Bug: 21862859 Change-Id: Ic22300a70586fd57692ac59d6873ab16dde70919
* Bump Security Patch Level to 2018-05-01Tim Schumacher2018-06-091-1/+1
| | | | | | | | | | | | | | | | | Implemented Patches =================== CVE-2017-13310 A-71992105 High Change 214984 CVE-2017-13313 A-74114680 High Change 214985 CVE-2017-13315 A-70721937 High Change 214982 CVE-2017-13316 A-73311729 Moderate Change 214983 CVE-2017-13319 A-71868329 High Change 214986 CVE-2017-13320 A-72764648 High Change 214987 CVE-2017-13323 A-73826242 Moderate Change 214988 CVE-2017-13322 A-67862398 Moderate Change 214989 Reference Version: 6.0 Change-Id: I645f2af604f833ba9d393a741f86170576b15ff1
* Bump Security Patch Level to 2018-04-01Tim Schumacher2018-06-091-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Implemented patches =================== CVE-2017-13274 A-71360761 High Change 211308 CVE-2017-13276 A-70637599 Critical Change 211309 CVE-2017-13277 A-72165027 Critical Change 211310 CVE-2017-13278 A-70546581 High Change 211347 CVE-2017-13279 A-68399439 High Change 211348 CVE-2017-13280 A-71361451 High Change 211349 CVE-2017-13267 A-69479009 Critical Change 211350 CVE-2017-13284 A-70808273 Critical Change 211351 CVE-2017-13287 A-71714464 High Change 211352 CVE-2017-13289 A-70398564 High Change 211353 CVE-2017-13290 A-69384124 High Change 211354 CVE-2017-13294 A-71814449 [1] Moderate Change 211364 CVE-2017-13294 A-71814449 [2] Moderate Change 211365 CVE-2017-13295 A-62537081 Moderate Change 211368 CVE-2017-13296 A-70897454 High Change 211355 CVE-2017-13297 A-71766721 High Change 211357 CVE-2017-13298 A-72117051 High Change 211358 CVE-2017-13299 A-70897394 High Change 211356 Skipped patches =============== CVE-2017-13285 A-69177126 High Can't fork svox due to DMCA If not merged, the patcher is in the 'asb-2018.04-cm13' topic on Gerrit CVE-2017-13300 A-71567394* High Not publicly available Change-Id: I8f2f06b674b3eb63648765e272d0623c35c04d60
* ASB March 2018, update security string to 2018-03-01MSe2018-03-101-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Implemented patches: ========================================== Media framework CVE-2017-13248 A-70349612 Critical CVE-2017-13249 A-70399408 Critical CVE-2017-13250 A-71375536 Critical CVE-2017-13251 A-69269702 Critical CVE-2017-13264 A-70294343 High CVE-2017-13254 A-70239507 High System CVE-2017-13255 A-68776054 Critical CVE-2017-13256 A-68817966 Critical CVE-2017-13266 A-69478941 Critical CVE-2017-13257 A-67110692 High CVE-2017-13258 A-67863755 High CVE-2017-13259 A-68161546[2] High CVE-2017-13260 A-69177251 High CVE-2017-13261 A-69177292 High CVE-2017-13262 A-69271284 High CVE-2017-13266 A-69478941 Moderate CVE-2017-13268 A-67058064 Moderate CVE-2017-13269 A-68818034 Moderate NOT Implemented, because not relevant ========================================== Framework CVE-2017-13263 A-69383160[2] Moderate 8.x only Media Framework CVE-2017-13252 A-70526702 High 8.x only CVE-2017-13253 A-71389378 High 8.x only System CVE-2017-13272 A-67110137[2] Critical 7.x/8.x only CVE-2017-13265 A-36232423[2,3] Moderate 7.x/8.x only Change-Id: I7d241a7d859cfadcb9d9aa700cb29e9495dbe902
* ASB February 2018, update security string to 2018-02-01Ivan Kutepov2018-02-091-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Implemented patches: ====================================== Media framework CVE-2017-13228 A-69478425 Critical CVE-2017-13229 A-68160703 Critical CVE-2017-13230 A-65483665 Critical CVE-2017-13232 A-68953950 High CVE-2017-13233 A-62851602 High CVE-2017-13234 A-68159767 High CVE-2017-13235 A-68342866 High CVE-2017-13241 A-69065651 Moderate System CVE-2017-13242 A-62672248 Moderate HAL CVE-2017-11041 A-35269676* High NOT Implemented, because not relevant ===================================== Framework CVE-2017-13239 A-66244132 Moderate 8.0 CVE-2017-13240 A-68694819 Moderate 8.0, 8.1 Media framework CVE-2017-13231 A-67962232 High 8.0, 8.1 System CVE-2017-13236 A-68217699 Moderate 8.0, 8.1 CVE-2017-13243 A-38258991 Moderate (not publicly available) Change-Id: I91117d71f7c28e3fe05c2a40a5513c66d73c8d4e