mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-01-13 00:19:27 -05:00
Update AOSP CVE list to September patches
- This will need to be re run after more links are added as usual
This commit is contained in:
parent
37ff7ddc2d
commit
556a8529e6
@ -7,5 +7,6 @@ CVE-2017-18275
|
||||
CVE-2017-18276
|
||||
CVE-2017-18278
|
||||
CVE-2017-18279
|
||||
CVE-2019-5489
|
||||
|
||||
https://source.android.com/security/bulletin/pixel/2019-09-01
|
||||
|
@ -1,4 +1,4 @@
|
||||
#Last checked 2020/08/05
|
||||
#Last checked 2020/09/08
|
||||
CVE-2015-0235
|
||||
Link - https://source.codeaurora.org/quic/le//oe/recipes/commit/?id=6025569cb2a156bb6765dc14d66cb83f46a8c338
|
||||
CVE-2015-3847
|
||||
|
@ -1,4 +1,4 @@
|
||||
#Last checked 2020/08/05
|
||||
#Last checked 2020/09/08
|
||||
CVE-2014-9028
|
||||
Link - external/flac - https://android.googlesource.com/platform/external/flac/+/fe03f73d86bb415f5d5145f0de091834d89ae3a9
|
||||
Link - external/flac - https://android.googlesource.com/platform/external/flac/+/5859ae22db0a2d16af3e3ca19d582de37daf5eb6
|
||||
@ -1354,6 +1354,8 @@ CVE-2019-10509
|
||||
Link - vendor/qcom-opensource/system/bt - https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/system/bt/commit/?id=9ac0f2da643d3830c2f5133392b42064031cd9b8
|
||||
CVE-2019-10510
|
||||
Link - vendor/qcom-opensource/system/bt - https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/system/bt/commit/?id=d005a97b4daa188a15696c46c72b67e5f49f7fc6
|
||||
CVE-2019-10521
|
||||
Link - https://source.codeaurora.org/quic/le/platform/hardware/qcom/gps/commit/?id=4788c8a1ee32619f59752d9068df2f5d316819eb
|
||||
CVE-2019-10569
|
||||
Link - hardware/qcom/audio - https://source.codeaurora.org/quic/la/platform/hardware/qcom/audio/commit/?id=bbf4497352958dd27036503a43cd8a031e7eb9b1
|
||||
CVE-2019-10581
|
||||
|
@ -1,3 +1,4 @@
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://www.qualcomm.com/company/product-security/bulletins/september-2020-bulletin" >> cve_list-qc.txt
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://www.qualcomm.com/company/product-security/bulletins/august-2020-security-bulletin" >> cve_list-qc.txt
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://www.qualcomm.com/company/product-security/bulletins/july-2020-security-bulletin" >> cve_list-qc.txt
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://www.qualcomm.com/company/product-security/bulletins/june-2020-security-bulletin" >> cve_list-qc.txt
|
||||
|
@ -1,3 +1,4 @@
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/2020-09-01" >> cve_list.txt
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/2020-08-01" >> cve_list.txt
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/2020-07-01" >> cve_list.txt
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/2020-06-01" >> cve_list.txt
|
||||
@ -7,6 +8,7 @@ java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulle
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/2020-02-01" >> cve_list.txt
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/2020-01-01" >> cve_list.txt
|
||||
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/pixel/2020-09-01" >> cve_list.txt
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/pixel/2020-08-01" >> cve_list.txt
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/pixel/2020-07-01" >> cve_list.txt
|
||||
java -jar $DOS_BINARY_PATCHER scraper "https://source.android.com/security/bulletin/pixel/2020-06-01" >> cve_list.txt
|
||||
|
Loading…
Reference in New Issue
Block a user