Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ASB - February 2024 Security Patches integration #2319

Merged
merged 1 commit into from
Feb 13, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ index 47bb92c142..2d0ac256a4 100644
# It must match one of the Android Security Patch Level strings of the Public Security Bulletins.
# If there is no $PLATFORM_SECURITY_PATCH set, keep it empty.
- PLATFORM_SECURITY_PATCH := 2022-02-05
+ PLATFORM_SECURITY_PATCH := 2024-01-01
+ PLATFORM_SECURITY_PATCH := 2024-02-01
endif
.KATI_READONLY := PLATFORM_SECURITY_PATCH

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
From 439eeb3b8723f9c06c4d0caeb9f86c97d712cbae Mon Sep 17 00:00:00 2001
From: kumarashishg <[email protected]>
Date: Wed, 28 Jun 2023 07:15:27 +0000
Subject: [PATCH] Change open jpeg folder name

Replace libopenjpeg20 to libopenjpeg as folder name got updated in the
pdfium library

Bug: 279055389
Test: Build the code and flash the device and check Print functionality
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:75bd8508b7040f33aed77945d5dfe2dfed4a071c)
Merged-In: I5b3d5740128f6ecc23dd8f9446a4f40c8550fd88
Change-Id: I5b3d5740128f6ecc23dd8f9446a4f40c8550fd88
---
.../securitybulletin/securityPatch/CVE-2016-8332/Android.bp | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/hostsidetests/securitybulletin/securityPatch/CVE-2016-8332/Android.bp b/hostsidetests/securitybulletin/securityPatch/CVE-2016-8332/Android.bp
index 382d629cdb3..aa676df02d2 100644
--- a/hostsidetests/securitybulletin/securityPatch/CVE-2016-8332/Android.bp
+++ b/hostsidetests/securitybulletin/securityPatch/CVE-2016-8332/Android.bp
@@ -30,8 +30,9 @@ cc_test {
],
static_libs: [
"libpdfium-libopenjpeg2",
+ "libpdfium-fxcrt",
],
include_dirs: [
- "external/pdfium/third_party/libopenjpeg20",
+ "external/pdfium/third_party/libopenjpeg",
],
}
--
2.43.0.195.gebba966016-goog

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
From d484868ea57c7b915622e46d31a1e4c401de6938 Mon Sep 17 00:00:00 2001
From: Ashish Kumar Gupta <[email protected]>
Date: Tue, 21 Nov 2023 08:48:43 +0530
Subject: [PATCH] Update mtp packet buffer

Currently, the buffer size is not changed when the packet size is increased. Ideally, the buffer size should be larger than the packet size. In our case, when the packet size is increased, we must reallocate the buffer of MTP packet.

Bug: 300007708
Test: build and flash the device. Check MTP works
Test: run fuzzer locally
(cherry picked from commit e1494a2d8e7eee25d7ea5469be43740e97294c99)
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:5c0f99beb6fa5ff920caf5b0d06aaebc8e9eab24)
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:55757c291af9c88bf829e01fda90e626f6ff06eb)
Merged-In: I98398a9e15962e6d5f08445ee7b17f5d61a3a528
Change-Id: I98398a9e15962e6d5f08445ee7b17f5d61a3a528
---
media/mtp/MtpPacket.cpp | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/media/mtp/MtpPacket.cpp b/media/mtp/MtpPacket.cpp
index 5faaac2026..634aa46dd9 100644
--- a/media/mtp/MtpPacket.cpp
+++ b/media/mtp/MtpPacket.cpp
@@ -168,8 +168,10 @@ void MtpPacket::setParameter(int index, uint32_t value) {
return;
}
int offset = MTP_CONTAINER_PARAMETER_OFFSET + (index - 1) * sizeof(uint32_t);
- if (mPacketSize < offset + sizeof(uint32_t))
+ if (mPacketSize < offset + sizeof(uint32_t)) {
mPacketSize = offset + sizeof(uint32_t);
+ allocate(mPacketSize);
+ }
putUInt32(offset, value);
}

--
2.43.0.195.gebba966016-goog

Loading
Loading