diff options
| author | Kevin F. Haggerty <haggertk@lineageos.org> | 2022-06-10 07:27:46 -0600 |
|---|---|---|
| committer | mosimchah <mosimchah@gmail.com> | 2022-06-14 12:02:53 -0400 |
| commit | 68c1c04d9e0184b74863ba3ab71509abc1103457 (patch) | |
| tree | 7f3af443530ae817a509ffc9e53f35328d2be9cc | |
| parent | 60aadc302d518daa52672b8b69a9e7db2bc0bf9d (diff) | |
Bump Security String to 2022-06-05r11.1
Implemented:
============
CVE: References: Type: Severity: Updated AOSP versions:
CVE-2021-39624 A-67862680 DoS High 10, 11, 12, 12L
CVE-2022-20123 A-221852424 ID High 10, 11, 12, 12L
CVE-2022-20124 A-170646036 EoP High 10, 11, 12, 12L
CVE-2022-20126 A-203431023 EoP High 10, 11, 12, 12L
CVE-2022-20127 A-221862119 RCE Critical 10, 11, 12, 12L
CVE-2022-20129 A-217934478 DoS High 10, 11, 12, 12L
CVE-2022-20130 A-224314979 RCE Critical 10, 11, 12, 12L
CVE-2022-20131 A-221856662 ID High 10, 11, 12, 12L
CVE-2022-20133 A-206807679 EoP High 10, 11, 12, 12L
CVE-2022-20134 A-218341397 EoP High 10, 11, 12, 12L
CVE-2022-20135 A-220303465 EoP High 10, 11, 12, 12L
CVE-2022-20138 A-210469972 EoP High 10, 11, 12, 12L
CVE-2022-20142 A-216631962 EoP High 10, 11, 12, 12L
CVE-2022-20143 A-220735360 DoS High 10, 11, 12, 12L
CVE-2022-20144 A-187702830 EoP High 10, 11, 12, 12L
CVE-2022-20145 A-201660636 EoP Critical 11
CVE-2022-20147 A-221216105 EoP High 10, 11, 12, 12L
Previously Implemented:
=======================
CVE: References: Type: Severity: Updated AOSP versions: Prior Change:
CVE-2021-39691 A-157929241 EoP High 10, 11, 12 1542cbaeca6f
ec8026367327
53414caeb6
1845e6f98a
CVE-2022-20006 A-151095871 EoP High 10, 11, 12, 12L cccb7d5d5a75
Unknown:
================
CVE: References: Type: Severity: Updated AOSP versions:
CVE-2022-20125 A-194402515 EoP High 10, 11, 12, 12L (not linked, bugid not referenced)
Not Applicable (platform source):
=================================
CVE: References: Type: Severity: Updated AOSP versions:
CVE-2022-20137 A-206986392 EoP High 12, 12L
CVE-2022-20140 A-227618988 EoP Critical 12, 12L
Change-Id: I6bab6e6521d3ddf5384b7e0d74aeadc168693fc3
| -rw-r--r-- | core/version_defaults.mk | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/core/version_defaults.mk b/core/version_defaults.mk index 1e93a51de6..803c262960 100644 --- a/core/version_defaults.mk +++ b/core/version_defaults.mk @@ -240,7 +240,7 @@ ifndef PLATFORM_SECURITY_PATCH # It must be of the form "YYYY-MM-DD" on production devices. # It must match one of the Android Security Patch Level strings of the Public Security Bulletins. # If there is no $PLATFORM_SECURITY_PATCH set, keep it empty. - PLATFORM_SECURITY_PATCH := 2022-05-05 + PLATFORM_SECURITY_PATCH := 2022-06-05 endif .KATI_READONLY := PLATFORM_SECURITY_PATCH |
