{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":75638219,"defaultBranch":"lineage-21.0","name":"android_build","ownerLogin":"LineageOS","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2016-12-05T15:28:08.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/24304779?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1725703794.0","currentOid":""},"activityList":{"items":[{"before":"a5c8915ab48dc2734442c426e935004099f046e0","after":"d50e78868db97d16cce2e2cda900edd129674144","ref":"refs/heads/lineage-20.0","pushedAt":"2024-09-13T15:24:38.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Bump Security String to 2024-09-05\n\nImplemented:\n============\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-32896 A-324321147 EoP High 12, 12L, 13, 14\nCVE-2024-40650 A-293199910 EoP High 12, 12L, 13, 14\nCVE-2024-40652 A-327749022 EoP High 12, 12L, 13, 14\nCVE-2024-40654 A-333364513 EoP High 12, 12L, 13, 14\nCVE-2024-40655 A-300904123 EoP High 12, 12L, 13, 14\nCVE-2024-40656 A-329058967 ID High 12, 12L, 13, 14\nCVE-2024-40657 A-341886134 EoP High 12, 12L, 13, 14\nCVE-2024-40658 A-329641908 EoP High 12, 12L, 13, 14\nCVE-2024-40662 A-261721900 EoP High 12, 12L, 13, 14\n\nNot Implemented:\n================\nNone\n\nNot Applicable (platform source):\n=================================\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-40659 A-336976105 DoS High 14\n\nChange-Id: I409ea654cebe1d607e4e89ffd1ca3ed1915b2ef0","shortMessageHtmlLink":"Bump Security String to 2024-09-05"}},{"before":"12a64c2575e65ab6d8cbbef4a3a8aacb95f8a4a1","after":"9531801b02c499820c129fb0ef501b1c76c34550","ref":"refs/heads/lineage-21.0","pushedAt":"2024-09-07T22:11:34.000Z","pushType":"push","commitsCount":30,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r67' into staging/lineage-21.0_merge-android-14.0.0_r67\n\nAndroid 14.0.0 release 67\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZteFvwAKCRDorT+BmrEO\n# eJKyAJ9Za6eCN9W5Vtp5x3MHynvOhgpuQQCeIlUZ4DfMU0yzHj2yG/5/cDxp7JE=\n# =5KIu\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Wed Sep 4 00:55:11 2024 EEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2593 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Android Build Coastguard Worker\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r67':\n Version bump to AP2A.240905.003 [core/build_id.mk]\n Version bump to AP2A.240905.002.F1 [core/build_id.mk]\n Version bump to AP2A.240905.002.E1 [core/build_id.mk]\n Version bump to AP2A.240905.002.D1 [core/build_id.mk]\n Version bump to AP2A.240905.002.C1 [core/build_id.mk]\n Version bump to AP2A.240905.002.B1 [core/build_id.mk]\n Version bump to AP2A.240905.002.A1 [core/build_id.mk]\n Version bump to AP2A.240905.002 [core/build_id.mk]\n Version bump to AP2A.240905.001.X1 [core/build_id.mk]\n Version bump to AP2A.240905.001 [core/build_id.mk]\n Version bump to AP2A.240805.005.F1 [core/build_id.mk]\n Version bump to AP2A.240805.005.E1 [core/build_id.mk]\n Version bump to AP2A.240805.005.C1 [core/build_id.mk]\n Version bump to AP2A.240805.005.A1 [core/build_id.mk]\n Version bump to AP2A.240805.005.D1 [core/build_id.mk]\n Version bump to AP2A.240805.005.B1 [core/build_id.mk]\n\nChange-Id: Ia6a0d7f43569974020991ea9b6b6adac3566f461","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r67' into staging/lineage-21.0_merge-androi…"}},{"before":null,"after":"3d9c9aacdb6ca0b745b3048dad88d0db4680d50e","ref":"refs/heads/lineage-22.0","pushedAt":"2024-09-07T10:09:54.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Version bump to AP3A.240905.015.A2 [core/build_id.mk]\n\nChange-Id: I3e2152d0e109ecc6c89c249dea678afc93faf62b","shortMessageHtmlLink":"Version bump to AP3A.240905.015.A2 [core/build_id.mk]"}},{"before":"e8636448168564515d61170f1acec4a95ce16a85","after":"9ce529efc10432da0fe7468848ee703726ce969d","ref":"refs/heads/lineage-19.1","pushedAt":"2024-08-24T17:07:59.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Bump Security String to 2024-08-05\n\nImplemented:\n============\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2023-21351 A-232798676 EoP High 12, 12L, 13\nCVE-2024-34727 A-287184435 ID High 12, 12L, 13, 14\nCVE-2024-34731 A-319210610 EoP High 12, 12L, 13, 14\nCVE-2024-34735 A-336490997 EoP High 12, 12L, 13\nCVE-2024-34736 A-288549440 ID High 12, 12L, 13, 14\nCVE-2024-34737 A-283103220 EoP High 12, 12L, 13, 14\nCVE-2024-34739 A-294105066 EoP High 12, 12L, 13, 14\nCVE-2024-34740 A-307288067 EoP High 12, 12L, 13, 14\nCVE-2024-34741 A-318683640 EoP High 12, 12L, 13, 14\n\nPreviously Implemented:\n=======================\nCVE: References: Type: Severity: Updated AOSP versions: Prior Change:\nCVE-2023-20971 A-225880325 EoP High 12, 12L, 13, 14 944a680cafc3\n\nNot Implemented:\n================\nNone\n\nNot Applicable (platform source):\n=================================\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-34734 A-304772709 EoP High 13, 14\nCVE-2024-34738 A-336323279 EoP High 13, 14\nCVE-2024-34742 A-335232744 DoS High 14\nCVE-2024-34743 A-336648613 EoP High 14\n\nChange-Id: I7bd13b4b5684d5e24ecaec8f5a55afb728280565","shortMessageHtmlLink":"Bump Security String to 2024-08-05"}},{"before":"61cafc87f7aad21bbd96f3dc7a0f2886a0e711be","after":"a5c8915ab48dc2734442c426e935004099f046e0","ref":"refs/heads/lineage-20.0","pushedAt":"2024-08-12T12:05:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Bump Security String to 2024-08-05\n\nImplemented:\n============\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2023-21351 A-232798676 EoP High 12, 12L, 13\nCVE-2024-34727 A-287184435 ID High 12, 12L, 13, 14\nCVE-2024-34731 A-319210610 EoP High 12, 12L, 13, 14\nCVE-2024-34734 A-304772709 EoP High 13, 14\nCVE-2024-34735 A-336490997 EoP High 12, 12L, 13\nCVE-2024-34736 A-288549440 ID High 12, 12L, 13, 14\nCVE-2024-34737 A-283103220 EoP High 12, 12L, 13, 14\nCVE-2024-34738 A-336323279 EoP High 13, 14\nCVE-2024-34739 A-294105066 EoP High 12, 12L, 13, 14\nCVE-2024-34740 A-307288067 EoP High 12, 12L, 13, 14\nCVE-2024-34741 A-318683640 EoP High 12, 12L, 13, 14\n\nPreviously Implemented:\n=======================\nCVE: References: Type: Severity: Updated AOSP versions: Prior Change:\nCVE-2023-20971 A-225880325 EoP High 12, 12L, 13, 14 a7245613009e\n\nNot Implemented:\n================\nNone\n\nNot Applicable (platform source):\n=================================\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-34742 A-335232744 DoS High 14\nCVE-2024-34743 A-336648613 EoP High 14\n\nChange-Id: I104ea141284a36501d9952c5cb22dca4121a058d","shortMessageHtmlLink":"Bump Security String to 2024-08-05"}},{"before":"34f580593729633708e4e3a680f24ceee2da861e","after":"12a64c2575e65ab6d8cbbef4a3a8aacb95f8a4a1","ref":"refs/heads/lineage-21.0","pushedAt":"2024-08-10T21:27:43.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Revert \"Remove non existent snapuserd.recovery package\"\n\nThis reverts commit 48a8f596075a7a6b805c52db036e961f9b23785f.\n\nReason for revert: b/349287459\n\nChange-Id: I5835cc025b37efca4d6294abf4aefd7148ddfd65","shortMessageHtmlLink":"Revert \"Remove non existent snapuserd.recovery package\""}},{"before":"d9d49308159b6c0c66c6cbd7189cdbb813223345","after":"34f580593729633708e4e3a680f24ceee2da861e","ref":"refs/heads/lineage-21.0","pushedAt":"2024-08-10T21:27:04.000Z","pushType":"push","commitsCount":32,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r55' into staging/lineage-21.0_merge-android-14.0.0_r55\n\nAndroid 14.0.0 Release 55 (AP2A.240805.005)\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZrKMEQAKCRDorT+BmrEO\n# eEKCAJ98mpvVYpvb0wLBckrIOhFCfYM0KACghtK7QAoEvrAY58EAnYSUOVPhC1w=\n# =BfNp\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Tue Aug 6 21:48:17 2024 WEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Can't check signature: No public key\n\n# By Android Build Coastguard Worker\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r55':\n Version bump to AP2A.240805.005 [core/build_id.mk]\n Version bump to AP2A.240805.004.G1 [core/build_id.mk]\n Version bump to AP2A.240805.004.F2 [core/build_id.mk]\n Version bump to AP2A.240805.004.F1 [core/build_id.mk]\n Version bump to AP2A.240805.004.E1 [core/build_id.mk]\n Version bump to AP2A.240805.004.D1 [core/build_id.mk]\n Version bump to AP2A.240805.004.C1 [core/build_id.mk]\n Version bump to AP2A.240805.004.B1 [core/build_id.mk]\n Version bump to AP2A.240805.004.A1 [core/build_id.mk]\n Version bump to AP2A.240805.004 [core/build_id.mk]\n Version bump to AP2A.240805.003.Y1 [core/build_id.mk]\n Version bump to AP2A.240805.003.X1 [core/build_id.mk]\n Version bump to AP2A.240805.003 [core/build_id.mk]\n Version bump to AP2A.240805.002 [core/build_id.mk]\n Version bump to AP2A.240805.001.Y1 [core/build_id.mk]\n Version bump to AP2A.240805.001.X1 [core/build_id.mk]\n Version bump to AP2A.240805.001 [core/build_id.mk]\n Version bump to AP2A.240705.005.A1 [core/build_id.mk]\n\nChange-Id: Ib7f6201805931d109111f7971a7d2746be8754e9","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r55' into staging/lineage-21.0_merge-androi…"}},{"before":"60daab0529a610f705f9b45c49fa529b652bcaad","after":"d9d49308159b6c0c66c6cbd7189cdbb813223345","ref":"refs/heads/lineage-21.0","pushedAt":"2024-07-25T20:31:27.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Don't copy recovery.img to BOOTABLE_IMAGES if it doesn't exist\n\nIf BOARD_USES_RECOVERY_AS_BOOT is set to true, recovery.img is\nnot built.\n\nIf BOARD_CUSTOM_BOOTIMG is set, INSTALLED_RECOVERYIMAGE_TARGET\ngets copied to BOOTABLE_IMAGES.\n\nIf both are set, the following error is produced.\n\nacp: missing destination file\n\nSince it is possible to have both BOARD_USES_RECOVERY_AS_BOOT and\nBOARD_CUSTOM_BOOTIMG set, guard the copy operation so that it does\nnot try to copy a missing recovery.img.\n\nChange-Id: Iae24e31a586e98955807d213df3dbaa0a2f13bae","shortMessageHtmlLink":"Don't copy recovery.img to BOOTABLE_IMAGES if it doesn't exist"}},{"before":"1898ccd7b908d245803d94ead1356f6885422085","after":"e8636448168564515d61170f1acec4a95ce16a85","ref":"refs/heads/lineage-19.1","pushedAt":"2024-07-18T12:07:55.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Bump Security String to 2024-07-05\n\nImplemented:\n============\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-31320 A-329230490 EoP Critical 12, 12L\nCVE-2024-31331 A-297517712 EoP High 12, 12L, 13, 14\nCVE-2024-31339 A-292160348 EoP High 12, 12L, 13, 14\nCVE-2024-34720 A-319081336 EoP High 12, 12L, 13, 14\nCVE-2024-34721 A-294406604 ID High 12, 12L, 13, 14\nCVE-2024-34722 A-251514170 EoP High 12, 12L, 13, 14\nCVE-2024-34723 A-317048338 EoP High 12, 12L, 13, 14\n\nNot Implemented:\n================\nNone\n\nNot Applicable (platform source):\n=================================\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-31332 A-299931076 EoP High 13, 14\n\nChange-Id: Icf1d280db7da32e7406c460cb513ec201e20f702","shortMessageHtmlLink":"Bump Security String to 2024-07-05"}},{"before":"dede32071bc7b5b74af31e7deaa6c178af019bde","after":"61cafc87f7aad21bbd96f3dc7a0f2886a0e711be","ref":"refs/heads/lineage-20.0","pushedAt":"2024-07-18T12:06:08.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Bump Security String to 2024-07-05\n\nImplemented:\n============\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-31331 A-297517712 EoP High 12, 12L, 13, 14\nCVE-2024-31332 A-299931076 EoP High 13, 14\nCVE-2024-31339 A-292160348 EoP High 12, 12L, 13, 14\nCVE-2024-34720 A-319081336 EoP High 12, 12L, 13, 14\nCVE-2024-34721 A-294406604 ID High 12, 12L, 13, 14\nCVE-2024-34722 A-251514170 EoP High 12, 12L, 13, 14\nCVE-2024-34723 A-317048338 EoP High 12, 12L, 13, 14\n\nNot Implemented:\n================\nNone\n\nNot Applicable (platform source):\n=================================\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-31320 A-329230490 EoP Critical 12, 12L\n\nChange-Id: I40f29031c21808ae54edcb33cf2f45c4044c6a51","shortMessageHtmlLink":"Bump Security String to 2024-07-05"}},{"before":"0ff3cb3ced6d06fa80cfcf5445970a0276a3d08c","after":"60daab0529a610f705f9b45c49fa529b652bcaad","ref":"refs/heads/lineage-21.0","pushedAt":"2024-07-15T19:36:51.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"sdk-addon: Prevent nested data/ inside $(PRIVATE_STAGING_DIR)\n\nCurrent logic recursively copies $(PRODUCT_OUT)/data into $(PRIVATE_STAGING_DIR)/data\nThis leads to creating $(PRIVATE_STAGING_DIR)/data/data on incremental\nbuilds causing emulator to fail to boot.\n\nTest: Build emulator sdk_addon twice, extract the zip, run the emulator\nand verify it boots and reaches homescreen\n\nChange-Id: I9e74d2ab28f9fbd67362578672d25d438fad0d53","shortMessageHtmlLink":"sdk-addon: Prevent nested data/ inside $(PRIVATE_STAGING_DIR)"}},{"before":"8124d9428ef269148f06c262f636d29e566d92d4","after":"0ff3cb3ced6d06fa80cfcf5445970a0276a3d08c","ref":"refs/heads/lineage-21.0","pushedAt":"2024-07-06T05:20:33.000Z","pushType":"push","commitsCount":11,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r53' into staging/lineage-21.0_merge-android-14.0.0_r53\n\nAndroid 14.0.0 release 53\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZoRXygAKCRDorT+BmrEO\n# eEH8AJwKWTjGg8ile2g+QwltEyqHn4ihUwCfbdTQaYQjd3jyCjo4Z/AMFXADVIk=\n# =yxqN\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Tue Jul 2 22:40:58 2024 EEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2551 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Android Build Coastguard Worker (6) and Daniel Zheng (1)\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r53':\n Version bump to AP2A.240705.005 [core/build_id.mk]\n Version bump to AP2A.240605.024.A1 [core/build_id.mk]\n Version bump to AP2A.240705.004 [core/build_id.mk]\n Version bump to AP2A.240705.001.A1 [core/build_id.mk]\n ota_from_target_files: read correct api level\n Version bump to AP2A.240705.002 [core/build_id.mk]\n Version bump to AP2A.240705.001 [core/build_id.mk]\n\nChange-Id: Ia399ba987d1f8225778ebf5e06220b13f301180c","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r53' into staging/lineage-21.0_merge-androi…"}},{"before":"26afa6d38a151c8a4acce0e28564d47f7713849d","after":"dede32071bc7b5b74af31e7deaa6c178af019bde","ref":"refs/heads/lineage-20.0","pushedAt":"2024-07-02T00:26:40.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"releasetools: Pass non-sparse super_empty.img to update_dynamic_partitions()\n\n* So that updater program can load dynamic partitions metadata from OTA\n when it fails to load from the device\n\nChange-Id: I73687009a2cb243aba1bfec6f357c8ff25f27784","shortMessageHtmlLink":"releasetools: Pass non-sparse super_empty.img to update_dynamic_parti…"}},{"before":"ea73f271e00847ea25b1dc232416685e1a21cb1e","after":"8124d9428ef269148f06c262f636d29e566d92d4","ref":"refs/heads/lineage-21.0","pushedAt":"2024-07-02T00:22:02.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"releasetools: Pass non-sparse super_empty.img to update_dynamic_partitions()\n\n* So that updater program can load dynamic partitions metadata from OTA\n when it fails to load from the device\n\nChange-Id: I73687009a2cb243aba1bfec6f357c8ff25f27784","shortMessageHtmlLink":"releasetools: Pass non-sparse super_empty.img to update_dynamic_parti…"}},{"before":"2ba7f00a9842115cd62aeca8ef4f021aec0f7699","after":"ea73f271e00847ea25b1dc232416685e1a21cb1e","ref":"refs/heads/lineage-21.0","pushedAt":"2024-06-23T16:58:23.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Allow installing fake [odm|product|system_ext] packages\n\nThis is required to use the install_symlink module on these\npartitions.\n\nTest: Create install_symlink module on /system_ext\nChange-Id: I78e93c5df12bae8fc23b378a30d43bf6c0b67d53","shortMessageHtmlLink":"Allow installing fake [odm|product|system_ext] packages"}},{"before":"8133aa8647b43a81384c7dae6905f39991916c18","after":"2ba7f00a9842115cd62aeca8ef4f021aec0f7699","ref":"refs/heads/lineage-21.0","pushedAt":"2024-06-22T02:08:39.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Revert \"Add e2fsck/resize2fs/tune2fs to recovery/vendor_ramdisk\"\n\nThis change has been moved to bootable/recovery\n\nThis reverts commit 728475b2d7e149de01ddd66c648160fc234b891b.\n\nChange-Id: Iaa413add3e9916ea560f464a5a2d8da337f89704","shortMessageHtmlLink":"Revert \"Add e2fsck/resize2fs/tune2fs to recovery/vendor_ramdisk\""}},{"before":"4888c1c610fb4c7e3e426d3475db8e854c6f4a33","after":"8133aa8647b43a81384c7dae6905f39991916c18","ref":"refs/heads/lineage-21.0","pushedAt":"2024-06-22T01:39:29.000Z","pushType":"push","commitsCount":1386,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Don't set PRODUCT_ENABLE_UFFD_GC by default\n\n* Overriding this from devices doesn't work\n* Using ?= here doesn't work either\n* It still defaults to \"default\" based on other places\n and works the same, so let's just remove this\n\nChange-Id: Ie9d732796a46770c11a7608e7c0990653d59fbd0","shortMessageHtmlLink":"Don't set PRODUCT_ENABLE_UFFD_GC by default"}},{"before":"722c54d2ddc48d914e10769348ae4381b4f47427","after":"1898ccd7b908d245803d94ead1356f6885422085","ref":"refs/heads/lineage-19.1","pushedAt":"2024-06-21T15:48:26.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Bump Security String to 2024-06-05\n\nImplemented:\n============\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2023-21113 A-267231571 EoP High 12, 12L, 13\nCVE-2023-21266 A-223376078 EoP High 12, 12L, 13\nCVE-2024-31310 A-324874908 EoP High 12, 12L, 13, 14\nCVE-2024-31311 A-330054251 EoP High 12, 12L, 13, 14\nCVE-2024-31312 A-314333719 ID High 12, 12L, 13, 14\nCVE-2024-31313 A-321341508 EoP High 12, 12L, 13, 14\nCVE-2024-31314 A-304290201 DoS High 12, 12L, 13, 14\nCVE-2024-31315 A-321707289 EoP High 12, 12L, 13, 14\nCVE-2024-31316 A-321941232 EoP High 12, 12L, 13, 14\nCVE-2024-31317 A-316153291 EoP High 12, 12L, 13, 14\nCVE-2024-31318 A-313428840 EoP High 12, 12L, 13, 14\nCVE-2024-31319 A-317357401 EoP High 12, 12L, 13, 14\nCVE-2024-31322 A-326485767 EoP High 12, 12L, 13, 14\nCVE-2024-31324 A-302431573 EoP High 12, 12L, 13, 14\nCVE-2024-31325 A-317503801 EoP High 12, 12L, 13, 14\nCVE-2024-31327 A-321326147 EoP High 12, 12L, 13, 14\n\nNot Implemented:\n================\nNone\n\nNot Applicable (platform source):\n=================================\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2023-21114 A-272106880 EoP High 13\nCVE-2024-31323 A-313425281 EoP High 14\nCVE-2024-31326 A-318497672 EoP High 14\n\nChange-Id: I4fef806fef4f62b0dbe52c50f252cdbb672465cc","shortMessageHtmlLink":"Bump Security String to 2024-06-05"}},{"before":"7264f02eb0944af87d5429d18c84e27f9a63c324","after":"26afa6d38a151c8a4acce0e28564d47f7713849d","ref":"refs/heads/lineage-20.0","pushedAt":"2024-06-21T15:36:55.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Bump Security String to 2024-06-05\n\nImplemented:\n============\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2023-21113 A-267231571 EoP High 12, 12L, 13\nCVE-2024-31310 A-324874908 EoP High 12, 12L, 13, 14\nCVE-2024-31311 A-330054251 EoP High 12, 12L, 13, 14\nCVE-2024-31312 A-314333719 ID High 12, 12L, 13, 14\nCVE-2024-31313 A-321341508 EoP High 12, 12L, 13, 14\nCVE-2024-31314 A-304290201 DoS High 12, 12L, 13, 14\nCVE-2024-31315 A-321707289 EoP High 12, 12L, 13, 14\nCVE-2024-31316 A-321941232 EoP High 12, 12L, 13, 14\nCVE-2024-31317 A-316153291 EoP High 12, 12L, 13, 14\nCVE-2024-31318 A-313428840 EoP High 12, 12L, 13, 14\nCVE-2024-31319 A-317357401 EoP High 12, 12L, 13, 14\nCVE-2024-31322 A-326485767 EoP High 12, 12L, 13, 14\nCVE-2024-31324 A-302431573 EoP High 12, 12L, 13, 14\nCVE-2024-31325 A-317503801 EoP High 12, 12L, 13, 14\nCVE-2024-31327 A-321326147 EoP High 12, 12L, 13, 14\n\nPreviously Implemented:\n=======================\nCVE: References: Type: Severity: Updated AOSP versions: Prior Change:\nCVE-2023-21114 A-272106880 EoP High 13 5d4999e56d\n 7c21ba1502\n 1d21fac8c0\nCVE-2023-21266 A-223376078 EoP High 12, 12L, 13 5b7edbf2ba07\n\nNot Implemented:\n================\nNone\n\nNot Applicable (platform source):\n=================================\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-31323 A-313425281 EoP High 14\nCVE-2024-31326 A-318497672 EoP High 14\n\nChange-Id: I4fef806fef4f62b0dbe52c50f252cdbb672465cc","shortMessageHtmlLink":"Bump Security String to 2024-06-05"}},{"before":"b7fd9639201c3842d7e0d91e4c303dc92df6fe4f","after":"722c54d2ddc48d914e10769348ae4381b4f47427","ref":"refs/heads/lineage-19.1","pushedAt":"2024-06-12T03:56:35.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Correct logic for obtaining the path to full recovery image\n\nCurrently, an extra '/vendor' is appended in target_files_dir of\nmake_recovery_patch.py, which will yield an erroneous path when\nattempting to build full recovery image on vendorimage-leas devices:\n\nSYSTEM/vendor/vendor/etc/recovery.img\n\nThis patch addresses the issue by removing the extra '/vendor' of\ntarget_files_dir, and add checks for whether the target builds\nvendor image in MakeRecoveryPatch() as well. This ensures no\nrecovery image will be generated with prebuilt vendor.\n\n[npjohnson]: !fixup Id706d90f54c4a87676b58fd11d76236bffa183f0\nwas squashed into this.\n\nSigned-off-by: Ricky Cheung \nChange-Id: I2dc6e43537deb606dd01fb090add2595502055c1\n(cherry picked from commit a9951bda956d3c47f8e0c3b506ef537b59eaf806)","shortMessageHtmlLink":"Correct logic for obtaining the path to full recovery image"}},{"before":"a6d7a365ba6e4aa32ce57c691b2f50f28e68f78d","after":"7264f02eb0944af87d5429d18c84e27f9a63c324","ref":"refs/heads/lineage-20.0","pushedAt":"2024-06-12T03:56:35.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Correct logic for obtaining the path to full recovery image\n\nCurrently, an extra '/vendor' is appended in target_files_dir of\nmake_recovery_patch.py, which will yield an erroneous path when\nattempting to build full recovery image on vendorimage-leas devices:\n\nSYSTEM/vendor/vendor/etc/recovery.img\n\nThis patch addresses the issue by removing the extra '/vendor' of\ntarget_files_dir, and add checks for whether the target builds\nvendor image in MakeRecoveryPatch() as well. This ensures no\nrecovery image will be generated with prebuilt vendor.\n\n[npjohnson]: !fixup Id706d90f54c4a87676b58fd11d76236bffa183f0\nwas squashed into this.\n\nSigned-off-by: Ricky Cheung \nChange-Id: I2dc6e43537deb606dd01fb090add2595502055c1\n(cherry picked from commit a9951bda956d3c47f8e0c3b506ef537b59eaf806)","shortMessageHtmlLink":"Correct logic for obtaining the path to full recovery image"}},{"before":"9996d2f15312bb51719e6ee03e99f7c367a0008b","after":"b7fd9639201c3842d7e0d91e4c303dc92df6fe4f","ref":"refs/heads/lineage-19.1","pushedAt":"2024-05-22T02:04:43.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Bump Security String to 2024-05-05\n\nImplemented:\n============\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-23708 A-293301736 EoP High 12, 12L, 13, 14\nCVE-2024-23709 A-317780080 ID High 12, 12L, 13, 14\n\nPreviously Implemented:\n=======================\nCVE: References: Type: Severity: Updated AOSP versions: Prior Change:\nCVE-2024-0024 A-293602317 EoP High 12, 12L, 13, 14 a7c40fadfd05\nCVE-2024-0025 A-279428283 EoP High 12, 12L, 13, 14 771669ad2121\nCVE-2024-0043 A-295549388 EoP High 12, 12L, 13, 14 d18fe94fdd\nCVE-2024-23705 A-293602970 EoP High 12, 12L, 13, 14 f9c285c5aa83\n\nNot Implemented:\n================\nNone\n\nNot Applicable (platform source):\n=================================\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-23706 A-328068777 EoP Critical 14\nCVE-2024-23707 A-316891059 EoP High 14\n\nChange-Id: Ic9157d0361716182961e61a69e80fd7bd0db8182","shortMessageHtmlLink":"Bump Security String to 2024-05-05"}},{"before":"a45102c64b686f150668cc6bdeba8257a53e5e7a","after":"a6d7a365ba6e4aa32ce57c691b2f50f28e68f78d","ref":"refs/heads/lineage-20.0","pushedAt":"2024-05-15T12:33:48.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Bump Security String to 2024-05-05\n\nImplemented:\n============\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-23708 A-293301736 EoP High 12, 12L, 13, 14\nCVE-2024-23709 A-317780080 ID High 12, 12L, 13, 14\n\nPreviously Implemented:\n=======================\nCVE: References: Type: Severity: Updated AOSP versions: Prior Change:\nCVE-2024-0024 A-293602317 EoP High 12, 12L, 13, 14 6a9250ec7fc9\nCVE-2024-0025 A-279428283 EoP High 12, 12L, 13, 14 a3047b59c453\nCVE-2024-0043 A-295549388 EoP High 12, 12L, 13, 14 5f36dcd7f\nCVE-2024-23705 A-293602970 EoP High 12, 12L, 13, 14 b23716810173\n\nNot Implemented:\n================\nNone\n\nNot Applicable (platform source):\n=================================\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-23706 A-328068777 EoP Critical 14\nCVE-2024-23707 A-316891059 EoP High 14\n\nChange-Id: I5e3abc6d931788e37c353958dc6cc3f6548681da","shortMessageHtmlLink":"Bump Security String to 2024-05-05"}},{"before":"2da41b24a7e6d4822647ff96a805f02baa74a852","after":"4888c1c610fb4c7e3e426d3475db8e854c6f4a33","ref":"refs/heads/lineage-21.0","pushedAt":"2024-05-11T14:42:15.000Z","pushType":"push","commitsCount":24,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge tag 'android-14.0.0_r35' into staging/lineage-21.0_merge-android-14.0.0_r35\n\nAndroid 14.0.0 release 35\n\n# -----BEGIN PGP SIGNATURE-----\n#\n# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZjprXQAKCRDorT+BmrEO\n# eGOyAJ9oyuLxQrlskFCPXdozj5Bat6TEEQCfUosLUXD+f1Achahgfhgy1kFIsaY=\n# =ZV9u\n# -----END PGP SIGNATURE-----\n# gpg: Signature made Tue May 7 20:56:45 2024 EEST\n# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78\n# gpg: Good signature from \"The Android Open Source Project \" [marginal]\n# gpg: initial-contribution@android.com: Verified 2425 signatures in the past\n# 2 years. Encrypted 4 messages in the past 2 years.\n# gpg: WARNING: This key is not certified with sufficiently trusted signatures!\n# gpg: It is not certain that the signature belongs to the owner.\n# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78\n\n# By Android Build Coastguard Worker (12) and Paul Scovanner (1)\n# Via Android Build Coastguard Worker\n* tag 'android-14.0.0_r35':\n Version bump to AP1A.240505.005 [core/build_id.mk]\n Version bump to AP1A.240405.002.A2 [core/build_id.mk]\n Version bump to AP1A.240405.002.B1 [core/build_id.mk]\n Version bump to AP1A.240505.004.Y2 [core/build_id.mk]\n Version bump to AP1A.240505.004.Y1 [core/build_id.mk]\n Version bump to AP1A.240505.004.X2 [core/build_id.mk]\n Version bump to AP1A.240505.004.X1 [core/build_id.mk]\n Version bump to AP1A.240505.004 [core/build_id.mk]\n Version bump to AP1A.240505.003 [core/build_id.mk]\n Version bump to AP1A.240505.002 [core/build_id.mk]\n Version bump to AP1A.240505.001 [core/build_id.mk]\n Version bump to AP1A.240405.002.Z1 [core/build_id.mk]\n Enable PLATFORM_BASE_OS overrides\n\nChange-Id: Ibbdb1205e2eb1d2de2c383eb5e11ff3917439794","shortMessageHtmlLink":"Merge tag 'android-14.0.0_r35' into staging/lineage-21.0_merge-androi…"}},{"before":"8ad73752af319002b57044ac2c99e6f5ae4e72e1","after":"4fdba55d8946e7ede6d54422770b9bce45590924","ref":"refs/heads/lineage-18.1","pushedAt":"2024-04-28T02:00:24.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"fixup! Correct logic for obtaining the path to full recovery image\n\n* The original change had the right idea BUT it removed\n the extra vendor from the \"root path\" instead of the\n \"target\" path.\n\n* This broke non-vendor building devices who did not\n set BOARD_USES_FULL_RECOVERY_IMAGE.\n\n* This wasn't noticed for so long on 21 as, well, almost\n no one on 21 doesn't build vendor image AND doesn't\n set the full recovery image flag.\n\n* This restores the expected behavior where all components\n are installed to (device relative) `/vendor`.\n\nChange-Id: Id706d90f54c4a87676b58fd11d76236bffa183f0","shortMessageHtmlLink":"fixup! Correct logic for obtaining the path to full recovery image"}},{"before":"ff09641484eb3d5784e85fc370454f8e29b44e16","after":"2da41b24a7e6d4822647ff96a805f02baa74a852","ref":"refs/heads/lineage-21.0","pushedAt":"2024-04-28T02:00:02.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"fixup! Correct logic for obtaining the path to full recovery image\n\n* The original change had the right idea BUT it removed\n the extra vendor from the \"root path\" instead of the\n \"target\" path.\n\n* This broke non-vendor building devices who did not\n set BOARD_USES_FULL_RECOVERY_IMAGE.\n\n* This wasn't noticed for so long on 21 as, well, almost\n no one on 21 doesn't build vendor image AND doesn't\n set the full recovery image flag.\n\n* This restores the expected behavior where all components\n are installed to (device relative) `/vendor`.\n\nChange-Id: Id706d90f54c4a87676b58fd11d76236bffa183f0","shortMessageHtmlLink":"fixup! Correct logic for obtaining the path to full recovery image"}},{"before":"8f71b53c5bd90af2debb37c6c82df6275c98b1ec","after":"9996d2f15312bb51719e6ee03e99f7c367a0008b","ref":"refs/heads/lineage-19.1","pushedAt":"2024-04-27T17:36:56.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Bump Security String to 2024-04-05\n\nImplemented:\n============\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2023-21267 A-218495634 ID High 12, 12L, 13, 14\nCVE-2024-23712 A-304983146 DoS High 12, 12L, 13, 14\nCVE-2024-23713 A-305926929 EoP High 12, 12L, 13, 14\n\nPreviously Implemented:\n=======================\nCVE: References: Type: Severity: Updated AOSP versions: Prior Change:\nCVE-2024-0026 A-308414141 DoS High 12, 12L, 13, 14 954039631283\nCVE-2024-0027 A-307948424 DoS High 12, 12L, 13, 14 954039631283\n\nNot Implemented:\n================\nNone\n\nNot Applicable (platform source):\n=================================\nCVE: References: Type: Severity: Updated AOSP versions:\nCVE-2024-0022 A-298635078 ID High 13, 14\nCVE-2024-23704 A-299931761 EoP High 13, 14\nCVE-2024-23710 A-311374917 EoP High 13, 14\n\nChange-Id: I9970ef1ac419e9cc84e051a9266a91dbaefcfa84","shortMessageHtmlLink":"Bump Security String to 2024-04-05"}},{"before":"a99837136a0ec8838057a3550308f50bf0774eb1","after":"8ad73752af319002b57044ac2c99e6f5ae4e72e1","ref":"refs/heads/lineage-18.1","pushedAt":"2024-04-27T04:32:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Correct logic for obtaining the path to full recovery image\n\nCurrently, an extra '/vendor' is appended in target_files_dir of\nmake_recovery_patch.py, which will yield an erroneous path when\nattempting to build full recovery image on vendorimage-leas devices:\n\nSYSTEM/vendor/vendor/etc/recovery.img\n\nThis patch addresses the issue by removing the extra '/vendor' of\ntarget_files_dir, and add checks for whether the target builds\nvendor image in MakeRecoveryPatch() as well. This ensures no\nrecovery image will be generated with prebuilt vendor.\n\nSigned-off-by: Ricky Cheung \nChange-Id: I2dc6e43537deb606dd01fb090add2595502055c1","shortMessageHtmlLink":"Correct logic for obtaining the path to full recovery image"}},{"before":"5c2a19744fe5770101cf1c3dfdcbcf6f60dcca41","after":"ff09641484eb3d5784e85fc370454f8e29b44e16","ref":"refs/heads/lineage-21.0","pushedAt":"2024-04-19T22:38:31.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"fixup! Support generating partial OTAs from extracted target_files\n\nChange-Id: I6728da3a3a50ee24a35581af7e6ead3e13c5ff1d","shortMessageHtmlLink":"fixup! Support generating partial OTAs from extracted target_files"}},{"before":"14d5ab785837a0fc59a40199be2a51a71c1da541","after":"5c2a19744fe5770101cf1c3dfdcbcf6f60dcca41","ref":"refs/heads/lineage-21.0","pushedAt":"2024-04-15T14:43:10.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"releasetools: Make recovery patch use bsdiff exclusively\n\nIt seems like switching from minigzip to toybox gzip (bug: 288169261)\nmakes imgdiff fail in in this way:\n* W imgdiff : imgdiff.cpp:1435 Failed to reconstruct target deflate chunk 3 []; treating as normal\n* E imgdiff : imgdiff.cpp:1390 Failed to set bonus data\n\nTest: Sign non-AB target files package\nChange-Id: I29f1d8f1168347141d80860e8ed02e19b0031447","shortMessageHtmlLink":"releasetools: Make recovery patch use bsdiff exclusively"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xM1QxNToyNDozOC4wMDAwMDBazwAAAAS1olqb","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xM1QxNToyNDozOC4wMDAwMDBazwAAAAS1olqb","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wNC0xNVQxNDo0MzoxMC4wMDAwMDBazwAAAAQxC8BR"}},"title":"Activity · LineageOS/android_build"}