| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
| |
It can exceed its maximum length for devices with longer codenames
(e.g. espressowifi). PRODUCT_BRAND is set to "Android" which doesn't
say much and TARGET_VENDOR_DEVICE_NAME should always have the same
codename that is already set in the build target
TARGET_VENDOR_PRODUCT_NAME, so no information is lost.
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Based on Paul's Replicant 4.2 patch:
commit 3e39ecabad250118c613b71e01738bb4c7a4d51c
Author: Paul Kocialkowski <contact@paulk.fr>
Date: Fri Apr 25 11:43:26 2014 +0200
kernel: mkimage dependency for U-Boot kernels
Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
|
|
|
|
| |
Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Without that fix we have:
Kernel: arch/arm/boot/zImage is ready
multiple (or no) load addresses:
This is incompatible with uImages
Specify LOADADDR on the commandline to build an uImage
make[3]: *** [arch/arm/boot/uImage] Error 1
make[2]: *** [uImage] Error 2
make[1]: *** [sub-make] Error 2
make[1]: Leaving directory `/home/gnutoo/embedded/android/replicant-4.0/kernel/goldelico/gta04'
make: *** [TARGET_KERNEL_BINARIES] Error 2
While building a recent kernel (3.10 based in that case).
Signed-off-by: Denis 'GNUtoo' Carikli <GNUtoo@no-log.org>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This results in nearly all functions with the possibility of stack
corruption getting stack canaries, because it applies to any function
taking a reference to the frame or with a local array rather than just
the functions with arrays larger than 8 bytes. It was developed for use
in Chrome (and Chrome OS) and has also been adopted by various other
distributions (Arch, Fedora, Ubuntu, etc).
The code size increase ranges from ~1.5% to ~2.5%, compared to ~0.3% to
~0.7% with the more conservative switch. The increase in the performance
loss is usually minimal. The overall size increase once everything other
than C and C++ code is taken into account is minimal, and it greatly
improves the mitigation of stack buffer overflow vulnerabilities.
https://lwn.net/Articles/584225/
Change-Id: Iccc20852db8a5e4dd9792f9da6d5e325fc59b0a5
|
|
|
|
|
|
| |
Relocation packer is built from source.
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
| |
Newer manifest merger expects colons instead of spaces.
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
| |
Port of commit f6fe3cf5 from Replicant 4.2
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
| |
sdklib and tools.common are needed from Debian
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
It's now available in Debian Stretch
|
|
|
|
|
|
| |
This fixes build errors with a more recent binutils.
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
| |
They changed in the latest gcc from 4.9 to 4.9.x
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
| |
export androideabi arm toolchain path
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
| |
this way, the prebuilt ones from the sdk are not needed
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
|
| |
take flex, bison, yasm and findbugs from /usr/bin
TODO: cleanup removal of analyzer
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
|
| |
this is just an initial version
various config parts need cleanup and more testing is necessary
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
|
|
|
| |
qemu kernel repo
it shouldn't matter from which kernel repo the licence text is taken
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
| |
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
| |
Change-Id: Iaafc283244ec47a0599c474a6a42efa4d87fa97c
Signed-off-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
|
|
|
|
|
| |
Change-Id: I3b4debf8f58f9dbc3b22aedb4df1402e04394227
Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
|
|
|
|
| |
Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2019-2027 A-119120561 Crit Change 251187
CVE-2019-2028 A-120644655 Crit Change 254099
CVE-2019-2031 A-120502559 High Change 251188
CVE-2019-2034 A-122035770 High Change 251192
CVE-2019-2035 A-122320256 High Change 251191
CVE-2019-2038 A-121259048 High Change 251190
CVE-2019-2039 A-121260197 High Change 251189
CVE-2019-2029 A-120612744 Crit Change 251193
CVE-2019-2037 A-119870451 High Change 251194
Reference Version: 7.0
Change-Id: I258c7ac961dbc2281b01f4ecd69097e5e08d57b9
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2018-20346 A-121156452 High Change 254060/249486
CVE-2019-1985 A-118694079* High Change 246141
CVE-2019-2003 A-116321860 High Change 246849
CVE-2019-2004 A-115739809 High Change 246139
CVE-2019-1989 A-118399205 Crit. Change 246143
CVE-2019-1990 A-118453553 Crit. Change 246142
CVE-2019-2009 A-120665616 Crit. vulnerable feature missing
CVE-2019-2010 A-118152591 High Change 246132
CVE-2019-2012 A-120497437 High Change 246131
CVE-2019-2013 A-120497583 High Change 246131
CVE-2019-2014 A-120499324 High Change 246138
CVE-2019-2015 A-120503926 High Change 246130
CVE-2019-2016 A-120664978 High Change 246129
CVE-2019-2017 A-121035711 High Change 246135
CVE-2018-9561 A-111660010[1] High Change 246134
CVE-2018-9561 A-111660010[2] High Change 246134
CVE-2018-9563 A-114237888[1] High Change 246134
CVE-2018-9563 A-114237888[2] High Change 246134
CVE-2018-9564 A-114238578[1] High Change 246134
CVE-2018-9564 A-114238578[2] High Change 246134
CVE-2019-2019 A-115635871 High Change 246136
CVE-2019-2020 A-116788646 High Change 246133
CVE-2019-2021 A-120428041 High Change 246137
CVE-2019-2022 A-120506143 High Change 246131
Reference version: 7.0
Change-Id: I3e73d75b38e88bfa649d2e960704cc4796f7b422
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2019-1987 A-118143775 [1] Crit. Dependency of [2]
CVE-2019-1987 A-118143775 [2] Crit. Not applicable
CVE-2017-17760 A-78029030* High Change 244765
CVE-2018-5268 A-78029634* High Change 244765
CVE-2018-5269 A-78029727* High Change 244765
CVE-2017-18009 A-78026242* Mod. Change 244765
CVE-2019-1991 A-110166268 Crit. Change 244753
CVE-2019-1992 A-116222069 Crit. Change 244755
CVE-2019-1995 A-32589229 [1] High Change 244756
CVE-2019-1995 A-32589229 [2] High Change 244757
CVE-2019-1997 A-117508900 High Change 244758
Reference Version: 7.0
Change-Id: Iac3b46a870f0a91900fcfe486e863ad1ff3466e6
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2018-9583 A-112860487 Critical Change 240477
CVE-2018-9584 A-114047681 High Change 240469
CVE-2018-9585 A-117554809 High Change 240470
CVE-2018-9586 A-116754444 High Change 240472
CVE-2018-9587 A-113597344 High Change 240466
CVE-2018-9588 A-111450156 High Change 241258
CVE-2018-9589 A-111893132 High Change 240471
CVE-2018-9590 A-115900043 High Change 240476
CVE-2018-9591 A-116108738 High Change 240473
CVE-2018-9592 A-116319076 High Change 240474
CVE-2018-9593 A-116722267 High Change 240467
CVE-2018-9594 A-116791157 High Change 240468
Reference Version: 7.0
Change-Id: I36bce7d9c888275f57fe1b3145cf0acca050a5bd
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2018-9548 A-112555574 High Change 239033
CVE-2018-9549 A-112160868 Critical Change 239038
CVE-2018-9552 A-113260892 Critical Change 239039
CVE-2018-9553 A-116615297 High No external/libvpx in M
CVE-2018-9554 A-114770654 High No IMediaExtractor.cpp
CVE-2018-9555 A-112321180 Critical No fn. l2c_lcc_proc_pdu
CVE-2018-9557 A-35385357 High Not publicly available
CVE-2018-9558 A-112161557 High Change 240414
CVE-2018-9559 A-112731440 High Change 239042
CVE-2018-9566 A-74249842 High Change 239041
Reference Version: 7.0
Change-Id: Ia9f18c3af1ab3e49d49da698bb64e0ea04c43607
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2018-9524 A-34170870 High Change 239014
CVE-2018-9527 A-112159345 Critical Change 239022/239023
CVE-2018-9540 A-111450417 High Change 239019
CVE-2018-9542 A-111896861 High Change 239020
CVE-2018-9541 A-111450531 High Change 239020
CVE-2018-9523 A-112859604 High Change 239017
Reference Version: 7.0
Change-Id: I037aae401038123386b2a12531b5a04c773eb26b
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2018-9490 A-111274046[1] Critical Change 234634/234636
CVE-2018-9490 A-111274046[2] Critical
CVE-2018-9491 A-111603051 High Change 234595
CVE-2018-9493 A-111085900[1] High
CVE-2018-9493 A-111085900[2] High
CVE-2018-9493 A-111085900[3] High
CVE-2018-9452 A-78464361[1] Moderate Change 238851
CVE-2018-9452 A-78464361[2] Moderate Change 238850
CVE-2018-9497 A-74078669 Critical Change 234596
CVE-2018-9498 A-78354855 Critical
CVE-2018-9499 A-79218474 High Change 234597
CVE-2017-13283 A-78526423 Critical Change 234598
CVE-2018-9504 A-110216176 Critical Change 234599
CVE-2018-9501 A-110034419 High
CVE-2018-9502 A-111936792[1] High Change 234601
CVE-2018-9502 A-111936792[2] High Change 234603
CVE-2018-9502 A-111936792[3] High Change 234602
CVE-2018-9503 A-80432928[1] High Change 234601
CVE-2018-9503 A-80432928[2] High Change 234603
CVE-2018-9503 A-80432928[3] High Change 234602
CVE-2018-9505 A-110791536 High Change 234604
CVE-2018-9506 A-111803925 High Change 234605
CVE-2018-9507 A-111893951 High Change 234606
CVE-2018-9508 A-111936834 High Change 234607
CVE-2018-9509 A-111937027 High Change 234608
CVE-2018-9510 A-111937065 High Change 234609
Change-Id: Ibdf13709f48457970aed0fccbea1bb6f550c335e
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2018-9466 A-62151041 High Change 234592
CVE-2018-9467 A-110955991 High Change 231177
CVE-2018-9470 A-78290481 High Already in fork/231223
CVE-2018-9471 A-77599679 High API not supported
CVE-2018-9472 A-79662501 High Change 234592
CVE-2018-9474 A-77600398 High Change 231190
CVE-2018-9440 A-77823362[1] Moderate Change 231191
CVE-2018-9440 A-77823362[2] Moderate Change 231192
CVE-2018-9475 A-79266386 Critical Change 234582
CVE-2018-9478 A-79217522 Critical Change 231222
CVE-2018-9479 A-79217770 Critical Change 231222
CVE-2018-9456 A-78136869 High Change 231224
CVE-2018-9483 A-110216173 High Change 234583
CVE-2018-9484 A-79488381 High Change 231225
CVE-2018-9485 A-80261585 High Change 231226
CVE-2018-9486 A-80493272 High Change 231227
CVE-2018-9468 A-111084083 High Change 231229
Reference Version: 7.0
Change-Id: I031bf1f0b6415c8f186156c957661c548ffd08e2
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2018-9445 A-80436257[1] High Change 223019
CVE-2018-9445 A-80436257[2] High Change 223020
CVE-2018-9451 A-79488511[1] High Change 223021
CVE-2018-9451 A-79488511[2] High Change 223022
CVE-2018-9444 A-63521984* High waiting for upstream
CVE-2018-9437 A-78656554 High Change 223023
CVE-2018-9446 A-80145946 Critical Change 223028
CVE-2018-9450 A-79541338 Critical N/A
CVE-2018-9459 A-66230183 High Change 223018
CVE-2018-9455 A-78136677 High Change 223029
CVE-2018-9436 A-79164722 High Change 223030
CVE-2018-9454 A-78286118 High Change 223030
CVE-2018-9453 A-78288378 High Change 223032
CVE-2018-9435 A-79591688 Moderate Change 223034
CVE-2018-9461 A-37629504 Moderate Change 223036
CVE-2018-9449 A-79884292 Moderate Change 223035
CVE-2018-9457 A-72872376 Moderate N/A
CVE-2018-9441 A-74075873[1] Moderate Change 223033
CVE-2018-9441 A-74075873[2] Moderate Change 223031
CVE-2017-13322 A-67862398 Moderate Change 223056
CVE-2018-9447 A-79995313 Moderate Change 223057
Change-Id: Icc68f7061e41111d6740237a95539214dad0e51f
|
|
|
|
|
|
|
|
|
|
|
| |
* ccache gets updated semi-frequently and some builders would like
to be able to take advantage of new features without having to
rely on the prebuilt version getting updated
* If a build system has ccache installed already, use that version
instead of the prebuilt
Change-Id: I8988c8a25fab3694d84633f957c2b92ce84cf69e
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Implemented Patches
===================
CVE-2018-9412 A-78029004 High Change 220462
CVE-2018-9421 A-77237570 High Change 220464
CVE-2018-9365 A-74121126 Critical Change 220470
CVE-2018-9432 A-73173182 High Change 220468
CVE-2018-9420 A-77238656 High Change 220469
CVE-2018-9376 A-69981755 Moderate
CVE-2018-9434 A-29833520 [1] Moderate Change 220466
CVE-2018-9434 A-29833520 [2] Moderate Change 220465
CVE-2018-9430 A-73963551 Moderate Change 220471
CVE-2018-9414 A-78787521 Moderate Change 220467
Skipped Patches
===============
CVE-2018-9433 A-38196219* Critical Not publicly available
Change-Id: I1963c50ef9679fc575b1186d5f074fa35dbe340a
|
|
|
|
| |
Change-Id: Ib23b8e2aa46d0ad37c51eb4c8f586b6047a9c0b0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Implemented patches:
------------------------------------------------------
CVE-2018-9338 A-71361168 High Change 217098
CVE-2018-9340 A-71360999 High Change 217098
CVE-2018-9341 A-74016277 Critical Change 217099
CVE-2018-5146 A-77284393* Critical Change 217101
CVE-2018-9345 A-77238250 High Change 217102
CVE-2018-9346 A-77238762 High Change 217102
CVE-2018-9347 A-68664359 High Change 217103
CVE-2018-9348 A-68953854 High Change 217103
CVE-2018-9355 A-74016921 Critical Change 217104
CVE-2018-9356 A-74950468 Critical Change 217106
CVE-2018-9357 A-74947856 Critical Change 217107
CVE-2018-9358 A-73172115 High Change 217108
CVE-2018-9359 A-74196706 High Change 217109
CVE-2018-9360 A-74201143 High Change 217109
CVE-2018-9361 A-74202041 High Change 217109
CVE-2018-9362 A-72298611 High Change 217110
CVE-2018-9375 A-75298708 Moderate Change 217111
CVE-2018-9378 A-73126106 Moderate Change 217112
CVE-2018-9379 A-63766886[2] Moderate Change 217113/217115
CVE-2018-9349 A-72510002 High Change 217114
CVE-2018-9350 A-73552574 High Change 217116
CVE-2018-9351 A-73625898 High Change 217117
CVE-2018-9352 A-73965867[2] High Change 217118/217119
CVE-2018-9353 A-73965890 High Change 217120
CVE-2018-9354 A-74067957 High Change 217121
Not implemented:
------------------------------------------------------
CVE-2017-13230 A-65483665 Critical Already backported
CVE-2018-9374 A-72710897 Moderate No Runtime Permissions
CVE-2018-9377 A-64752751* Moderate not found
CVE-2018-9382 A-35765136* Moderate not found
Reference version: 6.0
Change-Id: I65056a115e1f209d41b942f43ef79a5af3c4678a
|
|
|
|
|
|
|
|
|
|
|
|
| |
In user builds, adb without authentication is always disabled. However,
it doesn't work with the defaults because authentication doesn't work
without having ro.adb.secure=1 set. It makes sense to offer builds with
no adb but not builds with adb present in an unusable state (especially
as the default).
Bug: 22220212
Bug: 21862859
Change-Id: Ic22300a70586fd57692ac59d6873ab16dde70919
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Implemented Patches
===================
CVE-2017-13310 A-71992105 High Change 214984
CVE-2017-13313 A-74114680 High Change 214985
CVE-2017-13315 A-70721937 High Change 214982
CVE-2017-13316 A-73311729 Moderate Change 214983
CVE-2017-13319 A-71868329 High Change 214986
CVE-2017-13320 A-72764648 High Change 214987
CVE-2017-13323 A-73826242 Moderate Change 214988
CVE-2017-13322 A-67862398 Moderate Change 214989
Reference Version: 6.0
Change-Id: I645f2af604f833ba9d393a741f86170576b15ff1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Implemented patches
===================
CVE-2017-13274 A-71360761 High Change 211308
CVE-2017-13276 A-70637599 Critical Change 211309
CVE-2017-13277 A-72165027 Critical Change 211310
CVE-2017-13278 A-70546581 High Change 211347
CVE-2017-13279 A-68399439 High Change 211348
CVE-2017-13280 A-71361451 High Change 211349
CVE-2017-13267 A-69479009 Critical Change 211350
CVE-2017-13284 A-70808273 Critical Change 211351
CVE-2017-13287 A-71714464 High Change 211352
CVE-2017-13289 A-70398564 High Change 211353
CVE-2017-13290 A-69384124 High Change 211354
CVE-2017-13294 A-71814449 [1] Moderate Change 211364
CVE-2017-13294 A-71814449 [2] Moderate Change 211365
CVE-2017-13295 A-62537081 Moderate Change 211368
CVE-2017-13296 A-70897454 High Change 211355
CVE-2017-13297 A-71766721 High Change 211357
CVE-2017-13298 A-72117051 High Change 211358
CVE-2017-13299 A-70897394 High Change 211356
Skipped patches
===============
CVE-2017-13285 A-69177126 High Can't fork svox due to DMCA
If not merged, the patcher is in
the 'asb-2018.04-cm13' topic on Gerrit
CVE-2017-13300 A-71567394* High Not publicly available
Change-Id: I8f2f06b674b3eb63648765e272d0623c35c04d60
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Implemented patches:
==========================================
Media framework
CVE-2017-13248 A-70349612 Critical
CVE-2017-13249 A-70399408 Critical
CVE-2017-13250 A-71375536 Critical
CVE-2017-13251 A-69269702 Critical
CVE-2017-13264 A-70294343 High
CVE-2017-13254 A-70239507 High
System
CVE-2017-13255 A-68776054 Critical
CVE-2017-13256 A-68817966 Critical
CVE-2017-13266 A-69478941 Critical
CVE-2017-13257 A-67110692 High
CVE-2017-13258 A-67863755 High
CVE-2017-13259 A-68161546[2] High
CVE-2017-13260 A-69177251 High
CVE-2017-13261 A-69177292 High
CVE-2017-13262 A-69271284 High
CVE-2017-13266 A-69478941 Moderate
CVE-2017-13268 A-67058064 Moderate
CVE-2017-13269 A-68818034 Moderate
NOT Implemented, because not relevant
==========================================
Framework
CVE-2017-13263 A-69383160[2] Moderate 8.x only
Media Framework
CVE-2017-13252 A-70526702 High 8.x only
CVE-2017-13253 A-71389378 High 8.x only
System
CVE-2017-13272 A-67110137[2] Critical 7.x/8.x only
CVE-2017-13265 A-36232423[2,3] Moderate 7.x/8.x only
Change-Id: I7d241a7d859cfadcb9d9aa700cb29e9495dbe902
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Implemented patches:
======================================
Media framework
CVE-2017-13228 A-69478425 Critical
CVE-2017-13229 A-68160703 Critical
CVE-2017-13230 A-65483665 Critical
CVE-2017-13232 A-68953950 High
CVE-2017-13233 A-62851602 High
CVE-2017-13234 A-68159767 High
CVE-2017-13235 A-68342866 High
CVE-2017-13241 A-69065651 Moderate
System
CVE-2017-13242 A-62672248 Moderate
HAL
CVE-2017-11041 A-35269676* High
NOT Implemented, because not relevant
=====================================
Framework
CVE-2017-13239 A-66244132 Moderate 8.0
CVE-2017-13240 A-68694819 Moderate 8.0, 8.1
Media framework
CVE-2017-13231 A-67962232 High 8.0, 8.1
System
CVE-2017-13236 A-68217699 Moderate 8.0, 8.1
CVE-2017-13243 A-38258991 Moderate (not publicly available)
Change-Id: I91117d71f7c28e3fe05c2a40a5513c66d73c8d4e
|