mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-02-02 10:25:22 -05:00
17.1: July 2024 ASB work
Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
6dee42d038
commit
218493fc4a
@ -78,7 +78,7 @@ external/catch2 bcfbb791d09e390fb545c03ca002e570f764d960
|
|||||||
external/cblas 61ee00692011385347a5dd1ad872556899a5cf7a
|
external/cblas 61ee00692011385347a5dd1ad872556899a5cf7a
|
||||||
external/chromium-libpac c98fc96035e6fdc5b84d953d2bd38d2dcd175467
|
external/chromium-libpac c98fc96035e6fdc5b84d953d2bd38d2dcd175467
|
||||||
external/chromium-trace f4e722b911fcc6f7164026432de62a02ea3460fb
|
external/chromium-trace f4e722b911fcc6f7164026432de62a02ea3460fb
|
||||||
external/chromium-webview 55628131e0608ae5877fd6934719369e5002b679
|
external/chromium-webview 170a4ad46bc61af284392a04dda7dc378a638976
|
||||||
external/clang 8343f599c9e1dda8e6c1bb779af323a673a052f9
|
external/clang 8343f599c9e1dda8e6c1bb779af323a673a052f9
|
||||||
external/cldr 4e0bdd442c1e01f5c6147cf6032ce4f8587f4ede
|
external/cldr 4e0bdd442c1e01f5c6147cf6032ce4f8587f4ede
|
||||||
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
|
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
|
||||||
|
@ -145,7 +145,7 @@ index f0e779694c90..9f41a4136db9 100644
|
|||||||
OsConstants._LINUX_CAPABILITY_VERSION_3, 0);
|
OsConstants._LINUX_CAPABILITY_VERSION_3, 0);
|
||||||
StructCapUserData[] data;
|
StructCapUserData[] data;
|
||||||
diff --git a/core/java/com/android/internal/os/ZygoteConnection.java b/core/java/com/android/internal/os/ZygoteConnection.java
|
diff --git a/core/java/com/android/internal/os/ZygoteConnection.java b/core/java/com/android/internal/os/ZygoteConnection.java
|
||||||
index 52d0adba0a05..478ccfb2f568 100644
|
index fe2ff54194fb..6a46a0b7b8ec 100644
|
||||||
--- a/core/java/com/android/internal/os/ZygoteConnection.java
|
--- a/core/java/com/android/internal/os/ZygoteConnection.java
|
||||||
+++ b/core/java/com/android/internal/os/ZygoteConnection.java
|
+++ b/core/java/com/android/internal/os/ZygoteConnection.java
|
||||||
@@ -33,6 +33,7 @@ import android.net.Credentials;
|
@@ -33,6 +33,7 @@ import android.net.Credentials;
|
||||||
@ -156,7 +156,7 @@ index 52d0adba0a05..478ccfb2f568 100644
|
|||||||
import android.os.Trace;
|
import android.os.Trace;
|
||||||
import android.system.ErrnoException;
|
import android.system.ErrnoException;
|
||||||
import android.system.Os;
|
import android.system.Os;
|
||||||
@@ -595,6 +596,13 @@ class ZygoteConnection {
|
@@ -598,6 +599,13 @@ class ZygoteConnection {
|
||||||
throw new IllegalStateException("WrapperInit.execApplication unexpectedly returned");
|
throw new IllegalStateException("WrapperInit.execApplication unexpectedly returned");
|
||||||
} else {
|
} else {
|
||||||
if (!isZygote) {
|
if (!isZygote) {
|
||||||
|
@ -10,10 +10,10 @@ spawning when doing debugging.
|
|||||||
1 file changed, 2 insertions(+), 1 deletion(-)
|
1 file changed, 2 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
diff --git a/core/java/com/android/internal/os/ZygoteConnection.java b/core/java/com/android/internal/os/ZygoteConnection.java
|
diff --git a/core/java/com/android/internal/os/ZygoteConnection.java b/core/java/com/android/internal/os/ZygoteConnection.java
|
||||||
index 478ccfb2f568..355c1115fb4f 100644
|
index 6a46a0b7b8ec..c71a5c5f3d9b 100644
|
||||||
--- a/core/java/com/android/internal/os/ZygoteConnection.java
|
--- a/core/java/com/android/internal/os/ZygoteConnection.java
|
||||||
+++ b/core/java/com/android/internal/os/ZygoteConnection.java
|
+++ b/core/java/com/android/internal/os/ZygoteConnection.java
|
||||||
@@ -596,7 +596,8 @@ class ZygoteConnection {
|
@@ -599,7 +599,8 @@ class ZygoteConnection {
|
||||||
throw new IllegalStateException("WrapperInit.execApplication unexpectedly returned");
|
throw new IllegalStateException("WrapperInit.execApplication unexpectedly returned");
|
||||||
} else {
|
} else {
|
||||||
if (!isZygote) {
|
if (!isZygote) {
|
||||||
|
@ -22,7 +22,7 @@ index a8dd041454c9..6940b9eb36ed 100644
|
|||||||
<!-- Allows applications to access information about networks.
|
<!-- Allows applications to access information about networks.
|
||||||
<p>Protection level: normal
|
<p>Protection level: normal
|
||||||
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
index f247610fa8a3..a57a2b819f84 100644
|
index 7784e4a9717c..c2c2624bf063 100644
|
||||||
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
@@ -1025,7 +1025,7 @@ public class PermissionManagerService {
|
@@ -1025,7 +1025,7 @@ public class PermissionManagerService {
|
||||||
|
@ -100,7 +100,7 @@ index 2cf2b923ef90..ae206c1f5872 100644
|
|||||||
<string name="permlab_readCalendar">Read calendar events and details</string>
|
<string name="permlab_readCalendar">Read calendar events and details</string>
|
||||||
<!-- Description of an application permission, listed so the user can choose whether they want to allow the application to do this. -->
|
<!-- Description of an application permission, listed so the user can choose whether they want to allow the application to do this. -->
|
||||||
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
index a57a2b819f84..ecbee40cf574 100644
|
index c2c2624bf063..b826a90f1270 100644
|
||||||
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
@@ -1025,7 +1025,7 @@ public class PermissionManagerService {
|
@@ -1025,7 +1025,7 @@ public class PermissionManagerService {
|
||||||
|
@ -25,7 +25,7 @@ index d27b5ad0d646..32b022455451 100644
|
|||||||
Process.SYSTEM_UID, userId, delayingPermCallback);
|
Process.SYSTEM_UID, userId, delayingPermCallback);
|
||||||
// Allow app op later as we are holding mPackages
|
// Allow app op later as we are holding mPackages
|
||||||
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
index ed551795aad5..f247610fa8a3 100644
|
index b342f443d9ac..7784e4a9717c 100644
|
||||||
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
@@ -1024,6 +1024,10 @@ public class PermissionManagerService {
|
@@ -1024,6 +1024,10 @@ public class PermissionManagerService {
|
||||||
|
48
Patches/LineageOS-17.1/android_frameworks_base/397542.patch
Normal file
48
Patches/LineageOS-17.1/android_frameworks_base/397542.patch
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Martijn Coenen <maco@google.com>
|
||||||
|
Date: Thu, 29 Feb 2024 12:03:05 +0000
|
||||||
|
Subject: [PATCH] Verify UID of incoming Zygote connections.
|
||||||
|
|
||||||
|
Only the system UID should be allowed to connect to the Zygote. While
|
||||||
|
for generic Zygotes this is also covered by SELinux policy, this is not
|
||||||
|
true for App Zygotes: the preload code running in an app zygote could
|
||||||
|
connect to another app zygote socket, if it had access to its (random)
|
||||||
|
socket address.
|
||||||
|
|
||||||
|
On the Java layer, simply check the UID when the connection is made. In
|
||||||
|
the native layer, this check was already present, but it actually didn't
|
||||||
|
work in the case where we receive a new incoming connection on the
|
||||||
|
socket, and receive a 'non-fork' command: in that case, we will simply
|
||||||
|
exit the native loop, and let the Java layer handle the command, without
|
||||||
|
any further UID checking.
|
||||||
|
|
||||||
|
Modified the native logic to drop new connections with a mismatching
|
||||||
|
UID, and to keep serving the existing connection (if it was still
|
||||||
|
there).
|
||||||
|
|
||||||
|
[Backport: No native layer for ZygoteCommandBuffer present]
|
||||||
|
|
||||||
|
Bug: 319081336
|
||||||
|
Test: manual
|
||||||
|
(cherry picked from commit 2ffc7cb220e4220b7e108c4043a3f0f2a85b6508)
|
||||||
|
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e397fd3d20c3f409311e411387ec1524ccecf085)
|
||||||
|
Merged-In: I3f85a17107849e2cd3e82d6ef15c90b9e2f26532
|
||||||
|
Change-Id: I3f85a17107849e2cd3e82d6ef15c90b9e2f26532
|
||||||
|
---
|
||||||
|
core/java/com/android/internal/os/ZygoteConnection.java | 3 +++
|
||||||
|
1 file changed, 3 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/core/java/com/android/internal/os/ZygoteConnection.java b/core/java/com/android/internal/os/ZygoteConnection.java
|
||||||
|
index 52d0adba0a05..fe2ff54194fb 100644
|
||||||
|
--- a/core/java/com/android/internal/os/ZygoteConnection.java
|
||||||
|
+++ b/core/java/com/android/internal/os/ZygoteConnection.java
|
||||||
|
@@ -106,6 +106,9 @@ class ZygoteConnection {
|
||||||
|
throw ex;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ if (peer.getUid() != Process.SYSTEM_UID) {
|
||||||
|
+ throw new ZygoteSecurityException("Only system UID is allowed to connect to Zygote.");
|
||||||
|
+ }
|
||||||
|
isEof = false;
|
||||||
|
}
|
||||||
|
|
37
Patches/LineageOS-17.1/android_frameworks_base/397543.patch
Normal file
37
Patches/LineageOS-17.1/android_frameworks_base/397543.patch
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Yi-an Chen <theianchen@google.com>
|
||||||
|
Date: Tue, 23 Apr 2024 21:53:02 +0000
|
||||||
|
Subject: [PATCH] Fix security vulnerability of non-dynamic permission removal
|
||||||
|
|
||||||
|
The original removePermission() code in PermissionManagerService
|
||||||
|
missed a logical negation operator when handling non-dynamic
|
||||||
|
permissions, causing both
|
||||||
|
testPermissionPermission_nonDynamicPermission_permissionUnchanged and
|
||||||
|
testRemovePermission_dynamicPermission_permissionRemoved tests in
|
||||||
|
DynamicPermissionsTest to fail.
|
||||||
|
|
||||||
|
The corresponding test DynamicPermissionsTest is also updated in the
|
||||||
|
other CL: ag/27073864
|
||||||
|
|
||||||
|
Bug: 321711213
|
||||||
|
Test: DynamicPermissionsTest on sc-dev and tm-dev locally
|
||||||
|
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:35d77a77feef62dc108f6478cb9228cc6044f70d)
|
||||||
|
Merged-In: Id573b75cdcfce3a1df5731ffb00c4228c513e686
|
||||||
|
Change-Id: Id573b75cdcfce3a1df5731ffb00c4228c513e686
|
||||||
|
---
|
||||||
|
.../android/server/pm/permission/PermissionManagerService.java | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
|
index ed551795aad5..b342f443d9ac 100644
|
||||||
|
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
|
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
|
||||||
|
@@ -1011,7 +1011,7 @@ public class PermissionManagerService {
|
||||||
|
if (bp == null) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
- if (bp.isDynamic()) {
|
||||||
|
+ if (!bp.isDynamic()) {
|
||||||
|
// TODO: switch this back to SecurityException
|
||||||
|
Slog.wtf(TAG, "Not allowed to modify non-dynamic permission "
|
||||||
|
+ permName);
|
63
Patches/LineageOS-17.1/android_system_bt/397545.patch
Normal file
63
Patches/LineageOS-17.1/android_system_bt/397545.patch
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Brian Delwiche <delwiche@google.com>
|
||||||
|
Date: Mon, 22 Apr 2024 21:14:56 +0000
|
||||||
|
Subject: [PATCH] Fix an authentication bypass bug in SMP
|
||||||
|
|
||||||
|
When pairing with BLE legacy pairing initiated
|
||||||
|
from remote, authentication can be bypassed.
|
||||||
|
This change fixes it.
|
||||||
|
|
||||||
|
Bug: 251514170
|
||||||
|
Test: m com.android.btservices
|
||||||
|
Test: manual run against PoC
|
||||||
|
Ignore-AOSP-First: security
|
||||||
|
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8a3dbadc71428a30b172a74343be08498c656747)
|
||||||
|
Merged-In: I66b1f9a80060f48a604001829db8ea7c96c7b7f8
|
||||||
|
Change-Id: I66b1f9a80060f48a604001829db8ea7c96c7b7f8
|
||||||
|
---
|
||||||
|
stack/smp/smp_act.cc | 12 ++++++++++++
|
||||||
|
stack/smp/smp_int.h | 1 +
|
||||||
|
2 files changed, 13 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/stack/smp/smp_act.cc b/stack/smp/smp_act.cc
|
||||||
|
index c1f143e92..199c5abb3 100644
|
||||||
|
--- a/stack/smp/smp_act.cc
|
||||||
|
+++ b/stack/smp/smp_act.cc
|
||||||
|
@@ -284,6 +284,7 @@ void smp_send_pair_rsp(tSMP_CB* p_cb, tSMP_INT_DATA* p_data) {
|
||||||
|
void smp_send_confirm(tSMP_CB* p_cb, tSMP_INT_DATA* p_data) {
|
||||||
|
SMP_TRACE_DEBUG("%s", __func__);
|
||||||
|
smp_send_cmd(SMP_OPCODE_CONFIRM, p_cb);
|
||||||
|
+ p_cb->flags |= SMP_PAIR_FLAGS_CMD_CONFIRM_SENT;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*******************************************************************************
|
||||||
|
@@ -645,6 +646,17 @@ void smp_proc_init(tSMP_CB* p_cb, tSMP_INT_DATA* p_data) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ if (!((p_cb->loc_auth_req & SMP_SC_SUPPORT_BIT) &&
|
||||||
|
+ (p_cb->peer_auth_req & SMP_SC_SUPPORT_BIT)) &&
|
||||||
|
+ !(p_cb->flags & SMP_PAIR_FLAGS_CMD_CONFIRM_SENT)) {
|
||||||
|
+ // in legacy pairing, the peer should send its rand after
|
||||||
|
+ // we send our confirm
|
||||||
|
+ tSMP_INT_DATA smp_int_data{};
|
||||||
|
+ smp_int_data.status = SMP_INVALID_PARAMETERS;
|
||||||
|
+ smp_sm_event(p_cb, SMP_AUTH_CMPL_EVT, &smp_int_data);
|
||||||
|
+ return;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
/* save the SRand for comparison */
|
||||||
|
STREAM_TO_ARRAY(p_cb->rrand.data(), p, OCTET16_LEN);
|
||||||
|
}
|
||||||
|
diff --git a/stack/smp/smp_int.h b/stack/smp/smp_int.h
|
||||||
|
index 72fdf55a9..e3063c57d 100644
|
||||||
|
--- a/stack/smp/smp_int.h
|
||||||
|
+++ b/stack/smp/smp_int.h
|
||||||
|
@@ -241,6 +241,7 @@ typedef union {
|
||||||
|
(1 << 7) /* used to resolve race condition */
|
||||||
|
#define SMP_PAIR_FLAG_HAVE_LOCAL_PUBL_KEY \
|
||||||
|
(1 << 8) /* used on slave to resolve race condition */
|
||||||
|
+#define SMP_PAIR_FLAGS_CMD_CONFIRM_SENT (1 << 9)
|
||||||
|
|
||||||
|
/* check if authentication requirement need MITM protection */
|
||||||
|
#define SMP_NO_MITM_REQUIRED(x) (((x)&SMP_AUTH_YN_BIT) == 0)
|
@ -0,0 +1,63 @@
|
|||||||
|
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Brian Delwiche <delwiche@google.com>
|
||||||
|
Date: Mon, 22 Apr 2024 21:14:56 +0000
|
||||||
|
Subject: [PATCH] Fix an authentication bypass bug in SMP
|
||||||
|
|
||||||
|
When pairing with BLE legacy pairing initiated
|
||||||
|
from remote, authentication can be bypassed.
|
||||||
|
This change fixes it.
|
||||||
|
|
||||||
|
Bug: 251514170
|
||||||
|
Test: m com.android.btservices
|
||||||
|
Test: manual run against PoC
|
||||||
|
Ignore-AOSP-First: security
|
||||||
|
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8a3dbadc71428a30b172a74343be08498c656747)
|
||||||
|
Merged-In: I66b1f9a80060f48a604001829db8ea7c96c7b7f8
|
||||||
|
Change-Id: I66b1f9a80060f48a604001829db8ea7c96c7b7f8
|
||||||
|
---
|
||||||
|
stack/smp/smp_act.cc | 12 ++++++++++++
|
||||||
|
stack/smp/smp_int.h | 1 +
|
||||||
|
2 files changed, 13 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/stack/smp/smp_act.cc b/stack/smp/smp_act.cc
|
||||||
|
index a18d8389b..cb8b16329 100755
|
||||||
|
--- a/stack/smp/smp_act.cc
|
||||||
|
+++ b/stack/smp/smp_act.cc
|
||||||
|
@@ -290,6 +290,7 @@ void smp_send_pair_rsp(tSMP_CB* p_cb, tSMP_INT_DATA* p_data) {
|
||||||
|
void smp_send_confirm(tSMP_CB* p_cb, tSMP_INT_DATA* p_data) {
|
||||||
|
SMP_TRACE_DEBUG("%s", __func__);
|
||||||
|
smp_send_cmd(SMP_OPCODE_CONFIRM, p_cb);
|
||||||
|
+ p_cb->flags |= SMP_PAIR_FLAGS_CMD_CONFIRM_SENT;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*******************************************************************************
|
||||||
|
@@ -671,6 +672,17 @@ void smp_proc_rand(tSMP_CB* p_cb, tSMP_INT_DATA* p_data) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ if (!((p_cb->loc_auth_req & SMP_SC_SUPPORT_BIT) &&
|
||||||
|
+ (p_cb->peer_auth_req & SMP_SC_SUPPORT_BIT)) &&
|
||||||
|
+ !(p_cb->flags & SMP_PAIR_FLAGS_CMD_CONFIRM_SENT)) {
|
||||||
|
+ // in legacy pairing, the peer should send its rand after
|
||||||
|
+ // we send our confirm
|
||||||
|
+ tSMP_INT_DATA smp_int_data{};
|
||||||
|
+ smp_int_data.status = SMP_INVALID_PARAMETERS;
|
||||||
|
+ smp_sm_event(p_cb, SMP_AUTH_CMPL_EVT, &smp_int_data);
|
||||||
|
+ return;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
/* save the SRand for comparison */
|
||||||
|
STREAM_TO_ARRAY(p_cb->rrand.data(), p, OCTET16_LEN);
|
||||||
|
}
|
||||||
|
diff --git a/stack/smp/smp_int.h b/stack/smp/smp_int.h
|
||||||
|
index a9b4471fc..4aab2408a 100644
|
||||||
|
--- a/stack/smp/smp_int.h
|
||||||
|
+++ b/stack/smp/smp_int.h
|
||||||
|
@@ -248,6 +248,7 @@ enum {
|
||||||
|
(1 << 7) /* used to resolve race condition */
|
||||||
|
#define SMP_PAIR_FLAG_HAVE_LOCAL_PUBL_KEY \
|
||||||
|
(1 << 8) /* used on slave to resolve race condition */
|
||||||
|
+#define SMP_PAIR_FLAGS_CMD_CONFIRM_SENT (1 << 9)
|
||||||
|
|
||||||
|
/* check if authentication requirement need MITM protection */
|
||||||
|
#define SMP_NO_MITM_REQUIRED(x) (((x)&SMP_AUTH_YN_BIT) == 0)
|
@ -95,7 +95,7 @@ applyPatch "$DOS_PATCHES_COMMON/android_build/0001-verity-openssl3.patch"; #Fix
|
|||||||
sed -i '75i$(my_res_package): PRIVATE_AAPT_FLAGS += --auto-add-overlay' core/aapt2.mk; #Enable auto-add-overlay for packages, this allows the vendor overlay to easily work across all branches.
|
sed -i '75i$(my_res_package): PRIVATE_AAPT_FLAGS += --auto-add-overlay' core/aapt2.mk; #Enable auto-add-overlay for packages, this allows the vendor overlay to easily work across all branches.
|
||||||
awk -i inplace '!/updatable_apex.mk/' target/product/mainline_system.mk; #Disable APEX
|
awk -i inplace '!/updatable_apex.mk/' target/product/mainline_system.mk; #Disable APEX
|
||||||
sed -i 's/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 23/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 28/' core/version_defaults.mk; #Set the minimum supported target SDK to Pie (GrapheneOS)
|
sed -i 's/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 23/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 28/' core/version_defaults.mk; #Set the minimum supported target SDK to Pie (GrapheneOS)
|
||||||
sed -i 's/2023-02-05/2024-06-05/' core/version_defaults.mk; #Bump Security String #x_asb_2024-06
|
sed -i 's/2023-02-05/2024-07-05/' core/version_defaults.mk; #Bump Security String #x_asb_2024-07
|
||||||
fi;
|
fi;
|
||||||
|
|
||||||
if enterAndClear "build/soong"; then
|
if enterAndClear "build/soong"; then
|
||||||
@ -303,6 +303,8 @@ applyPatch "$DOS_PATCHES/android_frameworks_base/394558-backport.patch"; #R_asb_
|
|||||||
applyPatch "$DOS_PATCHES/android_frameworks_base/394559.patch"; #R_asb_2024-06 Add more checkKeyIntent checks to AccountManagerService.
|
applyPatch "$DOS_PATCHES/android_frameworks_base/394559.patch"; #R_asb_2024-06 Add more checkKeyIntent checks to AccountManagerService.
|
||||||
applyPatch "$DOS_PATCHES/android_frameworks_base/394560.patch"; #R_asb_2024-06 Add in check for intent filter when setting/updating service
|
applyPatch "$DOS_PATCHES/android_frameworks_base/394560.patch"; #R_asb_2024-06 Add in check for intent filter when setting/updating service
|
||||||
applyPatch "$DOS_PATCHES/android_frameworks_base/394561.patch"; #R_asb_2024-06 Check hidden API exemptions
|
applyPatch "$DOS_PATCHES/android_frameworks_base/394561.patch"; #R_asb_2024-06 Check hidden API exemptions
|
||||||
|
applyPatch "$DOS_PATCHES/android_frameworks_base/397542.patch"; #R_asb_2024-07 Verify UID of incoming Zygote connections.
|
||||||
|
applyPatch "$DOS_PATCHES/android_frameworks_base/397543.patch"; #R_asb_2024-07 Fix security vulnerability of non-dynamic permission removal
|
||||||
applyPatch "$DOS_PATCHES/android_frameworks_base/394562-backport.patch"; #R_asb_2024-06 AccessibilityManagerService: remove uninstalled services from enabled list after service update.
|
applyPatch "$DOS_PATCHES/android_frameworks_base/394562-backport.patch"; #R_asb_2024-06 AccessibilityManagerService: remove uninstalled services from enabled list after service update.
|
||||||
applyPatch "$DOS_PATCHES/android_frameworks_base/394882.patch"; #P_asb_2024-06 Check permissions for CDM shell commands
|
applyPatch "$DOS_PATCHES/android_frameworks_base/394882.patch"; #P_asb_2024-06 Check permissions for CDM shell commands
|
||||||
#applyPatch "$DOS_PATCHES/android_frameworks_base/272645.patch"; #ten-bt-sbc-hd-dualchannel: Add CHANNEL_MODE_DUAL_CHANNEL constant (ValdikSS)
|
#applyPatch "$DOS_PATCHES/android_frameworks_base/272645.patch"; #ten-bt-sbc-hd-dualchannel: Add CHANNEL_MODE_DUAL_CHANNEL constant (ValdikSS)
|
||||||
@ -627,6 +629,7 @@ applyPatch "$DOS_PATCHES/android_system_bt/383261.patch"; #Q_asb_2024-02 Fix an
|
|||||||
applyPatch "$DOS_PATCHES/android_system_bt/391914.patch"; #Q_asb_2024-03 Fix an OOB bug in smp_proc_sec_req
|
applyPatch "$DOS_PATCHES/android_system_bt/391914.patch"; #Q_asb_2024-03 Fix an OOB bug in smp_proc_sec_req
|
||||||
applyPatch "$DOS_PATCHES/android_system_bt/391915.patch"; #Q_asb_2024-03 Reland: Fix an OOB write bug in attp_build_value_cmd
|
applyPatch "$DOS_PATCHES/android_system_bt/391915.patch"; #Q_asb_2024-03 Reland: Fix an OOB write bug in attp_build_value_cmd
|
||||||
applyPatch "$DOS_PATCHES/android_system_bt/391916.patch"; #Q_asb_2024-03 Fix a security bypass issue in access_secure_service_from_temp_bond
|
applyPatch "$DOS_PATCHES/android_system_bt/391916.patch"; #Q_asb_2024-03 Fix a security bypass issue in access_secure_service_from_temp_bond
|
||||||
|
applyPatch "$DOS_PATCHES/android_system_bt/397545.patch"; #R_asb_2024-07 Fix an authentication bypass bug in SMP
|
||||||
applyPatch "$DOS_PATCHES_COMMON/android_system_bt/0001-alloc_size.patch"; #Add alloc_size attributes to the allocator (GrapheneOS)
|
applyPatch "$DOS_PATCHES_COMMON/android_system_bt/0001-alloc_size.patch"; #Add alloc_size attributes to the allocator (GrapheneOS)
|
||||||
#applyPatch "$DOS_PATCHES/android_system_bt/272648.patch"; #ten-bt-sbc-hd-dualchannel: Increase maximum Bluetooth SBC codec bitrate for SBC HD (ValdikSS)
|
#applyPatch "$DOS_PATCHES/android_system_bt/272648.patch"; #ten-bt-sbc-hd-dualchannel: Increase maximum Bluetooth SBC codec bitrate for SBC HD (ValdikSS)
|
||||||
#applyPatch "$DOS_PATCHES/android_system_bt/272649.patch"; #ten-bt-sbc-hd-dualchannel: Explicit SBC Dual Channel (SBC HD) support (ValdikSS)
|
#applyPatch "$DOS_PATCHES/android_system_bt/272649.patch"; #ten-bt-sbc-hd-dualchannel: Explicit SBC Dual Channel (SBC HD) support (ValdikSS)
|
||||||
@ -732,6 +735,7 @@ applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_system_bt/383264.patch";
|
|||||||
applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_system_bt/391917.patch"; #Q_asb_2024-03 Fix an OOB bug in smp_proc_sec_req
|
applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_system_bt/391917.patch"; #Q_asb_2024-03 Fix an OOB bug in smp_proc_sec_req
|
||||||
applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_system_bt/391918.patch"; #Q_asb_2024-03 Fix a security bypass issue in access_secure_service_from_temp_bond
|
applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_system_bt/391918.patch"; #Q_asb_2024-03 Fix a security bypass issue in access_secure_service_from_temp_bond
|
||||||
applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_system_bt/391919.patch"; #Q_asb_2024-03 Reland: Fix an OOB write bug in attp_build_value_cmd
|
applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_system_bt/391919.patch"; #Q_asb_2024-03 Reland: Fix an OOB write bug in attp_build_value_cmd
|
||||||
|
applyPatch "$DOS_PATCHES/android_vendor_qcom_opensource_system_bt/397546.patch"; #R_asb_2024-07 Fix an authentication bypass bug in SMP
|
||||||
fi;
|
fi;
|
||||||
|
|
||||||
if enterAndClear "vendor/lineage"; then
|
if enterAndClear "vendor/lineage"; then
|
||||||
|
Loading…
x
Reference in New Issue
Block a user