commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
SoftMPEG4: Check the buffer size before writing the reference frame. Also prevent overflow in SoftMPEG4 and division by zero in SoftMPEG4Encoder. Bug: 30033990 Change-Id: I7701f5fc54c2670587d122330e5dc851f64ed3c2 (cherry picked from commit 695123195034402ca76169b195069c28c30342d3)
d4271b792bdad85a80e2b83ab34c4b30b74f53ec
android
bigvul
1
null
null
null
Fix vulnerability in LockSettings service Fixes bug 30003944 Change-Id: I8700d4424c6186c8d5e71d2fdede0223ad86904d (cherry picked from commit 2d71384a139ae27cbc7b57f06662bf6ee2010f2b)
96daf7d4893f614714761af2d53dfb93214a32e4
android
bigvul
1
null
null
null
ServiceManager: Allow system services running as secondary users to add services This should be reverted when all system services have been cleaned up to not do this. A process looking up a service while running in the background will see the service registered by the active user (assuming the service is registered on every user switch), not the service registered by the user that the process itself belongs to. BUG: 30795333 Change-Id: I1b74d58be38ed358f43c163692f9e704f8f31dbe (cherry picked from commit e6bbe69ba739c8a08837134437aaccfea5f1d943)
047eec456943dc082e33220d28abb7df4e089f69
android
bigvul
1
null
null
null
OMXCodec: check IMemory::pointer() before using allocation Bug: 29421811 Change-Id: I0a73ba12bae4122f1d89fc92e5ea4f6a96cd1ed1
97837bb6cbac21ea679843a0037779d3834bed64
android
bigvul
1
null
null
null
Make TTY broadcasts protected Currently, any app can broadcast the intent to update the TTY mode. This change updates the intents to protected broadcasts so that only system can broadcast them. Otherwise, a SecurityException will be thown. Bug: 29832693 Change-Id: Ic9a91be3d8d15043e3165b766348cff301dd5da1
d1d248d10cf03498efb7041f1a8c9c467482a19d
android
bigvul
1
null
null
null
Fix string equality comparison Don't use "==" to compare strings. Bug: 25624963 Change-Id: Id25696e4fdcbcf4d48ec74e8ed65c1a33716b30c
81be4e3aac55305cbb5c9d523cf5c96c66604b39
android
bigvul
1
null
null
null
stop exporting EmailAccountCacheProvider Bug: 29767043 Change-Id: Ib9f16385a5e63557b6f293d148e49c9ad044c9b4
cb2dfe43f25cb0c32cc73aa4569c0a5186a4ef43
android
bigvul
1
null
null
null
Region: Detect malicious overflow in unflatten Bug 29983260 Change-Id: Ib6e1cb8ae279010c5e9960aaa03513f55b7d873b
363247929c35104b3e5ee9e637e9dcf579080aee
android
bigvul
1
null
null
null
adb: use asocket's close function when closing. close_all_sockets was assuming that all registered local sockets used local_socket_close as their close function. However, this is not true for JDWP sockets. Bug: http://b/28347842 Change-Id: I40a1174845cd33f15f30ce70828a7081cd5a087e (cherry picked from commit 53eb31d87cb84a4212f4850bf745646e1fb12814)
014b01706cc64dc9c2ad94a96f62e07c058d0b5d
android
bigvul
1
null
null
null
Pre-setup restrictions - Prevent external tiles from system apps - Disable help Bug: 29194585 Change-Id: I92da498110db49f7a523d6f775f191c4b52a4ad6
e206f02d46ae5e38c74d138b51f6e1637e261abe
android
bigvul
1
null
null
null
Do not allow premium SMS during SuW Bug: 29420123 Change-Id: I41ef7138635f11fbe7f495dd81103458cb969c35 (cherry picked from commit 15f55ca2f204e664807e047b5f898693b274bab6)
b8d1aee993dcc565e6576b2f2439a8f5a507cff6
android
bigvul
1
null
null
null
Disallow shell to mutate always-on vpn when DISALLOW_CONFIG_VPN user restriction is set Fix: 29899712 Change-Id: I38cc9d0e584c3f2674c9ff1d91f77a11479d8943 (cherry picked from commit 9c7b706cf4332b4aeea39c166abca04b56685280)
335702d106797bce8a88044783fa1fc1d5f751d0
android
bigvul
1
null
null
null
Don't allow enable/disable of tuner on lockscreen Change-Id: Id9748ea39a8fa03b67d3fa6f91da530dd5cf9409 Fixes: 30107438
6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5
android
bigvul
1
null
null
null
debuggerd: verify that traced threads belong to the right process. Fix two races in debuggerd's PTRACE_ATTACH logic: 1. The target thread in a crash dump request could exit between the /proc/<pid>/task/<tid> check and the PTRACE_ATTACH. 2. Sibling threads could exit between listing /proc/<pid>/task and the PTRACE_ATTACH. Bug: http://b/29555636 Change-Id: I4dfe1ea30e2c211d2389321bd66e3684dd757591
d7603583f90c2bc6074a4ee2886bd28082d7c65b
android
bigvul
1
null
null
null
Check uid for notification policy access. Bug: 29421441 Change-Id: Ia0a7b06112dde1c925ec3232f50bf4d90b17b5e5 (cherry picked from commit 0cd1b789567b60b963fc7b8935e898ea0e61a617)
61e9103b5725965568e46657f4781dd8f2e5b623
android
bigvul
1
null
null
null
DO NOT MERGE add private function convertSafeLable Bug: 28557603 Change-Id: I8d6a13a71011c38e7dd7039fa7ae0a69cf6adc2e
b2c89e6f8962dc7aff88cb38aa3ee67d751edda9
android
bigvul
1
null
null
null
VenueNameElement: fix off-by-one enum bounds check Fix the off-by-one error in the conditionals that check whether the Venue Group and Venue Type codes in the ANQP element are in the "Reserved" range. BUG: 30169673 BUG: 29464811 TEST: Manually set up AP with Hotspot 2.0 support, broadcasting Venue Group value 0xc, and ensure that device does not crash when in range of this AP. Change-Id: I14adc3a919e19b67fc0f46bf09d0cffb88b5354e (cherry picked from commit 48ee5f1e1c6e2a2dc63e9cb84c42f532c8a6847a)
35a86eef3c0eef760f7e61c52a343327ba601630
android
bigvul
1
null
null
null
DO NOT MERGE | libvpx: cherry-pick aa1c813 from upstream Description from upstream: vp9: Fix potential SEGV in decoder_peek_si_internal decoder_peek_si_internal could potentially read more bytes than what actually exists in the input buffer. We check for the buffer size to be at least 8, but we try to read up to 10 bytes in the worst case. A well crafted file could thus cause a segfault. Likely change that introduced this bug was: https://chromium-review.googlesource.com/#/c/70439 (git hash: 7c43fb6) Bug: 30013856 Change-Id: If556414cb5b82472d5673e045bc185cc57bb9af3 (cherry picked from commit bd57d587c2eb743c61b049add18f9fd72bf78c33)
4974dcbd0289a2530df2ee2a25b5f92775df80da
android
bigvul
1
null
null
null
Fix corruption via buffer overflow in mediaserver change unbound sprintf() to snprintf() so network-provided values can't overflow the buffers. Applicable to all K/L/M/N branches. Bug: 25747670 Change-Id: Id6a5120c2d08a6fbbd47deffb680ecf82015f4f6
68f67ef6cf1f41e77337be3bc4bff91f3a3c6324
android
bigvul
1
null
null
null
Fix NULL pointer dereference Bug: 29770686 Bug: 23304983 Change-Id: I1648aab90bc281702a00744bf884ae8bb8009412
cadfb7a3c96d4fef06656cf37143e1b3e62cae86
android
bigvul
1
null
null
null
Fixed error concealment when no MBs are decoded in the current pic Bug: 29493002 Change-Id: I3fae547ddb0616b4e6579580985232bd3d65881e
7109ce3f8f90a28ca9f0ee6e14f6ac5e414c62cf
android
bigvul
1
null
null
null
Block user from setting safe boot setting via adb Bug: 29900345 Change-Id: Id3b4472b59ded2c7c29762ddf008ee8486009dbb
91fc934bb2e5ea59929bb2f574de6db9b5100745
android
bigvul
1
null
null
null
DO NOT MERGE Block the user from entering safe boot mode Block the user from entering safe boot mode if the DISALLOW_SAFE_BOOT policy is set. Bug: 26251884 Change-Id: I4945d5d676928346c11ea305a5b6a2e1a42e94e6
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
android
bigvul
1
null
null
null
fix build Change-Id: I9bb8c659d3fc97a8e748451d82d0f3448faa242b
9f9ba255a0c59544f3555c9c45512c3a2fac5fad
android
bigvul
1
null
null
null
SoftMP3: memset safely Bug: 29422022 Change-Id: I70c9e33269d16bf8c163815706ac24e18e34fe97
c2639afac631f5c1ffddf70ee8a6fe943d0bedf9
android
bigvul
1
null
null
null
omx: prevent input port enable/disable for software codecs Bug: 29421804 Change-Id: Iba1011e9af942a6dff7f659af769a51e3f5ba66f
1e9801783770917728b7edbdeff3d0ec09c621ac
android
bigvul
1
null
null
null
stagefright: fix possible stack overflow in AVCC reassemble Additionally, remove use of variable length array which is non-standard in C++. Bug: 29161888 Change-Id: Ifdc3e7435f2225214c053b13f3bfe71c7d0ff506
119a012b2a9a186655da4bef3ed4ed8dd9b94c26
android
bigvul
1
null
null
null
DO NOT MERGE: Remove the use of JHEAD in ExifInterface Bug: 29270469 Change-Id: I6a6c8aeab2a842ff1646316363d614851625e78f
e739d9ca5469ed30129d0fa228e3d0f2878671ac
android
bigvul
1
null
null
null
libutils/Unicode.cpp: Correct length computation and add checks for utf16->utf8 Inconsistent behaviour between utf16_to_utf8 and utf16_to_utf8_length is causing a heap overflow. Correcting the length computation and adding bound checks to the conversion functions. Test: ran libutils_tests Bug: 29250543 Change-Id: I6115e3357141ed245c63c6eb25fc0fd0a9a7a2bb (cherry picked from commit c4966a363e46d2e1074d1a365e232af0dcedd6a1)
ecf5fd58a8f50362ce9e8d4245a33d56f29f142b
android
bigvul
1
null
null
null
Use SSL_session_reused to check when a session was reused The returned session_id could be exactly the same in the case of TLS session tickets, so use the SSL_session_reused API to determine exactly when a session was reused. (cherry picked from commit 1115fa0f6dbbff3a913fbce39ca98f9a78425c72) Bug: 28751153 Change-Id: Ie82e4d1bb326d7e7deb7981a1e57df393f6c0e1f
5af5e93463f4333187e7e35f3bd2b846654aa214
android
bigvul
1
null
null
null
DO NOT MERGE Fix potential DoS caused by delivering signal to BT process Bug: 28885210 Change-Id: I63866d894bfca47464d6e42e3fb0357c4f94d360 Conflicts: btif/co/bta_hh_co.c btif/src/btif_core.c Merge conflict resolution of ag/1161415 (referencing ag/1164670) - Directly into mnc-mr2-release
472271b153c5dc53c28beac55480a8d8434b2d5c
android
bigvul
1
null
null
null
DO NOT MERGE Disable app pinning when emergency call button pressed Also disables app pinning when the "return to call" button is pressed and brings up the in-call screen when app pinning is stopped if there is an existing call. Combination of ag/1091397 and ag/1085584 adapted for MNC. Bug: 28558307 Bug: 28761672 Change-Id: I82ec4042bff387c845ce571b197a4a86e1dd5ec8
468651c86a8adb7aa56c708d2348e99022088af3
android
bigvul
1
null
null
null
Deal correctly with short strings The parseMacAddress function anticipates only properly formed MAC addresses (6 hexadecimal octets separated by ":"). This change properly deals with situations where the string is shorter than expected, making sure that the passed in char* reference in parseHexByte never exceeds the end of the string. BUG: 28164077 TEST: Added a main function: int main(int argc, char **argv) { unsigned char addr[6]; if (argc > 1) { memset(addr, 0, sizeof(addr)); parseMacAddress(argv[1], addr); printf("Result: %02x:%02x:%02x:%02x:%02x:%02x\n", addr[0], addr[1], addr[2], addr[3], addr[4], addr[5]); } } Tested with "", "a" "ab" "ab:c" "abxc". Change-Id: I0db8d0037e48b62333d475296a45b22ab0efe386
a209ff12ba9617c10550678ff93d01fb72a33399
android
bigvul
1
null
null
null
Add FrameStats default constructor Bug 28592402 Change-Id: I857e46c9ab3ffae0d96923d665d13a4128a6cafa
3bcf0caa8cca9143443814b36676b3bae33a4368
android
bigvul
1
null
null
null
DO NOT MERGE mm-video-v4l2: venc: add checks before accessing heap pointers Heap pointers do not point to user virtual addresses in case of secure session. Set them to NULL and add checks to avoid accesing them Bug: 28815329 Bug: 28920116 Change-Id: I94fd5808e753b58654d65e175d3857ef46ffba26
7558d03e6498e970b761aa44fff6b2c659202d95
android
bigvul
1
null
null
null
DO NOT MERGE: Camera: Adjust pointers to ANW buffers to avoid infoleak Subtract address of a random static object from pointers being routed through app process. Bug: 28466701 Change-Id: Idcbfe81e9507433769672f3dc6d67db5eeed4e04
1f24c730ab6ca5aff1e3137b340b8aeaeda4bdbc
android
bigvul
1
null
null
null
Add pm operation to set user restrictions. Bug: 29189712 Change-Id: I6fdb3b68dfe3f51119e5ce8008880fc7d9c793df
4e4743a354e26467318b437892a9980eb9b8328a
android
bigvul
1
null
null
null
Don't trust callers to supply app info to bindBackupAgent() Get the canonical identity and metadata about the package from the Package Manager at time of usage rather than rely on the caller to have gotten things right, even when the caller has the system uid. Bug 28795098 Change-Id: I215786bc894dedf7ca28e9c80cefabd0e40ca877 Merge conflict resolution for ag/1133474 (referencing ag/1148862) - directly to mnc-mr2-release
e7cf91a198de995c7440b3b64352effd2e309906
android
bigvul
1
null
null
null
backport security fix: avoid set NITZ time to 2038 Bug: 29083635 Change-Id: I21c5f4147d8146f92b7e33f0967a179ae644a263
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
android
bigvul
1
null
null
null
SoftAAC2: fix crash on all-zero adts buffer Bug: 29153599 Change-Id: I1cb81c054098b86cf24f024f8479909ca7bc85a6
8e438e153f661e9df8db0ac41d587e940352df06
android
bigvul
1
null
null
null
Decoder: Initialize first_pb_nal_in_pic for error slices first_pb_nal_in_pic was uninitialized for error clips Bug: 29023649 Change-Id: Ie4e0a94059c5f675bf619e31534846e2c2ca58ae
326fe991a4b7971e8aeaf4ac775491dd8abd85bb
android
bigvul
1
null
null
null
Decoder: Do not conceal slices with invalid SPS/PPS Bug: 28835995
7554755536019e439433c515eeb44e701fb3bfb2
android
bigvul
1
null
null
null
SoftHEVC: Exit gracefully in case of decoder errors Exit for error in allocation and unsupported resolutions Bug: 28816956 Change-Id: Ieb830bedeb3a7431d1d21a024927df630f7eda1e
a4567c66f4764442c6cb7b5c1858810194480fb5
android
bigvul
1
null
null
null
Check effect command reply size in AudioFlinger Bug: 29251553 Change-Id: I1bcc1281f1f0542bb645f6358ce31631f2a8ffbf
9cd8c3289c91254b3955bd7347cf605d6fa032c6
android
bigvul
1
null
null
null
DO NOT MERGE Fix wrong nAllocLen Set nAllocLen to the size of the opaque handle itself. Bug: 28816964 Bug: 28816827 Change-Id: Id410e324bee291d4a0018dddb97eda9bbcded099
d575ecf607056d8e3328ef2eb56c52e98f81e87d
android
bigvul
1
null
null
null
DO NOT MERGE omx: check buffer port before using Bug: 28816827 Change-Id: I3d5bad4a1ef96dec544b05bb31cc6f7109aae0a5
b351eabb428c7ca85a34513c64601f437923d576
android
bigvul
1
null
null
null
Fix possible out of bounds access Bug: 28868315 Change-Id: I2b416c662f9ad7f9b3c6cf973a39c6693c66775a
bae671597d47b9e5955c4cb742e468cebfd7ca6b
android
bigvul
1
null
null
null
Don't use sp<>& because they may end up pointing to NULL after a NULL check was performed. Bug: 28166152 Change-Id: Iab2ea30395b620628cc6f3d067dd4f6fcda824fe
42a25c46b844518ff0d0b920c20c519e1417be69
android
bigvul
1
null
null
null
Decoder: Fix slice number increment for error clips Bug: 28673410
a78887bcffbc2995cf9ed72e0697acf560875e9e
android
bigvul
1
null
null
null
Fix potential overflow Bug: 28533562 Change-Id: I798ab24caa4c81f3ba564cad7c9ee019284fb702
590d1729883f700ab905cdc9ad850f3ddd7e1f56
android
bigvul
1
null
null
null
Check malloc result to avoid NPD Bug: 28471206 Change-Id: Id5d055d76893d6f53a2e524ff5f282d1ddca3345
e7142a0703bc93f75e213e96ebc19000022afed9
android
bigvul
1
null
null
null
Fixed out of bound read in flush_bits Bug: 28168413 Change-Id: I3db5432a08daf665e160c0dab2d1928a576418b4
d1c775d1d8d2ed117d1e026719b7f9f089716597
android
bigvul
1
null
null
null
Clear unused pointer field when sending across binder Bug: 28377502 Change-Id: Iad5ebfb0a9ef89f09755bb332579dbd3534f9c98
daef4327fe0c75b0a90bb8627458feec7a301e1f
android
bigvul
1
null
null
null
Don't pass URL path and username/password to PAC scripts The URL path could contain credentials that apps don't want exposed to a potentially malicious PAC script. Bug: 27593919 Change-Id: I4bb0362fc91f70ad47c4c7453d77d6f9a1e8eeed
ec2fc50d202d975447211012997fe425496c849c
android
bigvul
1
null
null
null
Remove generic socket access from untrusted processes SELinux defines various classes for various socket types, including tcp_socket, udp_socket, rawip_socket, netlink_socket, etc. Socket classes not known to the SELinux kernel code get lumped into the generic "socket" class. In particular, this includes the AF_MSM_IPC socket class. Bluetooth using apps were granted access to this generic socket class at one point in 2012. In 1601132086b054adc70e7f8f38ed24574c90bc37, a TODO was added indicating that this access was likely unnecessary. In cb835a2852997dde0be2941173f8c879ebbef157, an auditallow was added to test to see if this rule was actually used, and in master branch d0113ae0aed1a455834f26ec847b6ca8610e3b16, this rule was completely deleted. Revoke access to the generic socket class for isolated_app, untrusted_app, and shell for older Android releases. This is conceptually a backport of d0113ae0aed1a455834f26ec847b6ca8610e3b16, but affecting fewer domains to avoid potential breakage. Add a neverallow rule asserting that this rule isn't present for the untrusted domains. Contrary to our usual conventions, the neverallow rule is placed in bluetooth.te, to avoid merge conflicts and simplify patching. Bug: 28612709 Bug: 25768265 Change-Id: Ibfbb67777e448784bb334163038436f3c4dc1b51
abf0663ed884af7bc880a05e9529e6671eb58f39
android
bigvul
1
null
null
null
Verify setForegroundDispatch caller is in foreground. Bug: 28300969 Change-Id: Icadfe70cd06f921badd266e7a4efbae15a8c206a
9ea802b5456a36f1115549b645b65c791eff3c2c
android
bigvul
1
null
null
null
Add guest mode functionality (2/3) Add a flag to enable() to start Bluetooth in restricted mode. In restricted mode, all devices that are paired during restricted mode are deleted upon leaving restricted mode. Right now restricted mode is only entered while a guest user is active. Bug: 27410683 Change-Id: I8f23d28ef0aa3a8df13d469c73005c8e1b894d19
37c88107679d36c419572732b4af6e18bb2f7dce
android
bigvul
1
null
null
null
Backport of backup transport whitelist Sysconfig define a whitelist of permitted backup transports Previously any apk bundled in priv-app could insert a backup transport. Reduce risk surface by giving the OEM explicit control over who is allowed to handle backup data. Bug 28406080 Backport of 494df791728f4d42d67e935c327910975993ad29 from N Change-Id: I9f90e324169a68720d608f74754d284a7e59cf87
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
android
bigvul
1
null
null
null
Fix potential buffer overrun. BUG=27840771 Change-Id: I240f188b2e8f4b45d90138cfb3b14869cf506452
338aeaf28e9981c15d0673b18487dba61eb5447c
android
bigvul
1
null
null
null
Fix scanf %s in lsof. Bug: http://b/28175237 Change-Id: Ief0ba299b09693ad9afc0e3d17a8f664c2fbb8c2
ae18eb014609948a40e22192b87b10efc680daa7
android
bigvul
1
null
null
null
Check partword is in range for # of partitions and reformat tabs->spaces for readability. Bug: 28556125 Change-Id: Id02819a6a5bcc24ba4f8a502081e5cb45272681c
659030a2e80c38fb8da0a4eb68695349eec6778b
android
bigvul
1
null
null
null
Decoder: Set u1_long_term_reference_flag to 0 for error concealment For MBs which are in error, set u1_long_term_reference_flag to zero. This ensures latest frame is used for concealment Bug: 28470138 Change-Id: I58eab5bc1da277823f3dbb4103ba50867f8935dc
d4841f1161bdb5e13cb19e81af42437a634dd6ef
android
bigvul
1
null
null
null
limit mediaserver memory Limit mediaserver using rlimit, to prevent it from bringing down the system via the low memory killer. Default max is 65% of total RAM, but can be customized via system property. Bug: 28471206 Bug: 28615448 Change-Id: Ic84137435d1ef0a6883e9789a4b4f399e4283f05
6fdee2a83432b3b150d6a34f231c4e2f7353c01e
android
bigvul
1
null
null
null
Backport ChooserTarget package source check from N Fix a bug where a ChooserTargetService could supply a ChooserTarget pointing at a non-exported activity outside of its own package and have it launch. Bug 28384423 Change-Id: I3f5854f91c5695ad9253d71055ef58224df47008
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
android
bigvul
1
null
null
null
DO NOT MERGE Update libpng to 1.6.20 BUG:23265085 Change-Id: I85199805636d771f3597b691b63bc0bf46084833 (cherry picked from commit bbe98b40cda082024b669fa508931042eed18f82)
9d4853418ab2f754c2b63e091c29c5529b8b86ca
android
bigvul
1
null
null
null
Correctly handle dup() failure in Parcel::readNativeHandle bail out if dup() fails, instead of creating an invalid native_handle_t Bug: 28395952 Change-Id: Ia1a6198c0f45165b9c6a55a803e5f64d8afa0572
54cb02ad733fb71b1bdf78590428817fb780aff8
android
bigvul
1
null
null
null
Fix missing permission check when saving pattern/password Fixes bug 28163930 Change-Id: Ic98ef20933b352159b88fdef331e83e9ef6e1f20
e83f0f6a5a6f35323f5367f99c8e287c440f33f5
android
bigvul
1
null
null
null
Further restrict socket ioctls available to apps Restrict unix_dgram_socket and unix_stream_socket to a whitelist for all domains. Remove ioctl permission for netlink_selinux_socket and netlink_route_socket for netdomain. Bug: 28171804 Bug: 27424603 Change-Id: I650639115b8179964ae690a39e4766ead0032d2e
556bb0f55324e8839d7b735a0de9bc31028e839e
android
bigvul
1
null
null
null
DO NOT MERGE mm-video-v4l2: venc: Avoid processing ETBs/FTBs in invalid states (per the spec) ETB/FTB should not be handled in states other than Executing, Paused and Idle. This avoids accessing invalid buffers. Also add a lock to protect the private-buffers from being deleted while accessing from another thread. Bug: 27903498 Security Vulnerability - Heap Use-After-Free and Possible LPE in MediaServer (libOmxVenc problem #3) CRs-Fixed: 1010088 Change-Id: I898b42034c0add621d4f9d8e02ca0ed4403d4fd3
4ed06d14080d8667d5be14eed200e378cba78345
android
bigvul
1
null
null
null
DO NOT MERGE mm-video-v4l2: vdec: Avoid processing ETBs/FTBs in invalid states (per the spec) ETB/FTB should not be handled in states other than Executing, Paused and Idle. This avoids accessing invalid buffers. Also add a lock to protect the private-buffers from being deleted while accessing from another thread. Bug: 27890802 Security Vulnerability - Heap Use-After-Free and Possible LPE in MediaServer (libOmxVdec problem #6) CRs-Fixed: 1008882 Change-Id: Iaac2e383cd53cf9cf8042c9ed93ddc76dba3907e
5b82f4f90c3d531313714df4b936f92fb0ff15cf
android
bigvul
1
null
null
null
DO NOT MERGE Fix AudioEffect reply overflow Bug: 28173666 Change-Id: I055af37a721b20c5da0f1ec4b02f630dcd5aee02
073a80800f341325932c66818ce4302b312909a4
android
bigvul
1
null
null
null
DO NOT MERGE btif: check overflow on create_pbuf size Bug: 27930580 Change-Id: Ieb1f23f9a8a937b21f7c5eca92da3b0b821400e6
514139f4b40cbb035bb92f3e24d5a389d75db9e6
android
bigvul
1
null
null
null
Decoder: Memset few structures to zero to handle error clips Bug: 27907656 Change-Id: I671d135dd5c324c39b4ede990b7225d52ba882cd
ecf6c7ce6d5a22d52160698aab44fc234c63291a
android
bigvul
1
null
null
null
Decoder: Fix for handling invalid intra mode Bug: 28165659 Change-Id: I2291a287c27291695f4f3d6e753b6bbd7dfd9e42
a583270e1c96d307469c83dc42bd3c5f1b9ef63f
android
bigvul
1
null
null
null
Fix slice params for interlaced video Bug: 28165661 Change-Id: I912a86bd78ebf0617fd2bc6eb2b5a61afc17bf53
cc676ebd95247646e67907ccab150fb77a847335
android
bigvul
1
null
null
null
MPEG4Extractor: ensure kKeyTrackID exists before creating an MPEG4Source as track. GenericSource: return error when no track exists. SampleIterator: make sure mSamplesPerChunk is not zero before using it as divisor. Bug: 21657957 Bug: 23705695 Bug: 22802344 Bug: 28799341 Change-Id: I7664992ade90b935d3f255dcd43ecc2898f30b04 (cherry picked from commit 0386c91b8a910a134e5898ffa924c1b6c7560b13)
f81038006b4c59a5a148dcad887371206033c28f
android
bigvul
1
null
null
null
h264bsdActivateParamSets: Prevent multiplication overflow. Report MEMORY_ALLOCATION_ERROR if pStorage->picSizeInMbs would exceed UINT32_MAX bytes. Bug: 28532266 Change-Id: Ia6f11efb18818afcdb5fa2a38a14f2a2d8c8447a
60547808ca4e9cfac50028c00c58a6ceb2319301
android
bigvul
1
null
null
null
Fix security vulnerability in libstagefright bug: 28175045 Change-Id: Icee6c7eb5b761da4aa3e412fb71825508d74d38f
e248db02fbab2ee9162940bc19f087fd7d96cb9d
android
bigvul
1
null
null
null
Check section size when verifying CRC Bug: 28333006 Change-Id: Ief7a2da848face78f0edde21e2f2009316076679
4f236c532039a61f0cf681d2e3c6e022911bbb5c
android
bigvul
1
null
null
null
Kill the real/isolated uid group, not the ApplicationInfo uid This is a direct reimplementation in L of fixes applied to N in these two commits: 8dc8d37c1d7d694016f1ec2b3cea5fb723567be8 e8741d23d2dd05c4cb3fed5ee6a4040ee96a60e3 Bug 19285814 Change-Id: I59bcc8f1d41c426e9da635bea9ad1d7c6756d5aa Resolve merge conflict when cp'ing ag/941553 to mnc-mr1-release branch
9878bb99b77c3681f0fda116e2964bac26f349c3
android
bigvul
1
null
null
null
AudioSource: initialize variables to prevent info leak Bug: 27855172 Change-Id: I3d33e0a9cc5cf8a758d7b0794590b09c43a24561
dd3546765710ce8dd49eb23901d90345dec8282f
android
bigvul
1
null
null
null
DO NOT MERGE Fix intent filter priorities Since this is a backport, there is only one rule that guards intent filter priorities: 1) Updates will NOT be granted a priority greater than the priority defined on the system image. Bug: 27450489 Change-Id: Ifcec4d7a59e684331399abc41eea1bd6876155a4
a75537b496e9df71c74c1d045ba5569631a16298
android
bigvul
1
null
null
null
DO NOT MERGE Take advantage of new MotionEvent flag to prevent tapjacking. Bug: 26677796 Change-Id: I563541f0a42564b854af0f8037c1d4741c79a2ac Fix merge conflict when cp'ing ag/903239 to mnc-mr1-release
2068c7997265011ddc5e4dfa3418407881f7f81e
android
bigvul
1
null
null
null
SampleTable.cpp: Fixed a regression caused by a fix for bug 28076789. Detail: Before the original fix (Id207f369ab7b27787d83f5d8fc48dc53ed9fcdc9) for 28076789, the code allowed a time-to-sample table size to be 0. The change made in that fix disallowed such situation, which in fact should be allowed. This current patch allows it again while maintaining the security of the previous fix. Bug: 28288202 Bug: 28076789 Change-Id: I1c9a60c7f0cfcbd3d908f24998dde15d5136a295
b57b3967b1a42dd505dbe4fcf1e1d810e3ae3777
android
bigvul
1
null
null
null
Fix overflow in path building An incorrect size was causing an unsigned value to wrap, causing it to write past the end of the buffer. Bug: 28085658 Change-Id: Ie9625c729cca024d514ba2880ff97209d435a165
864e2e22fcd0cba3f5e67680ccabd0302dfda45d
android
bigvul
1
null
null
null
DO NOT MERGE codecs: check OMX buffer size before use in (vorbis|opus)dec Bug: 27833616 Change-Id: I1ccdd16a00741da072527a6d13e87fd7c7fe8c54
4e32001e4196f39ddd0b86686ae0231c8f5ed944
android
bigvul
1
null
null
null
Check mp3 output buffer size Bug: 27793371 Change-Id: I0fe40a4cfd0a5b488f93d3f3ba6f9495235926ac
ad40e57890f81a3cf436c5f06da66396010bd9e5
android
bigvul
1
null
null
null
codecs: check OMX buffer size before use in (gsm|g711)dec Bug: 27793163 Bug: 27793367 Change-Id: Iec3de8a237ee2379d87a8371c13e543878c6652c
7cea5cb64b83d690fe02bc210bbdf08f5a87636f
android
bigvul
1
null
null
null
DO NOT MERGE mm-video-v4l2: venc: add safety checks for freeing buffers Allow only up to 64 buffers on input/output port (since the allocation bitmap is only 64-wide). Add safety checks to free only as many buffers were allocated. Fixes: Heap Overflow and Possible Local Privilege Escalation in MediaServer (libOmxVenc problem) Bug: 27532497 Change-Id: I31e576ef9dc542df73aa6b0ea113d72724b50fc6
89913d7df36dbeb458ce165856bd6505a2ec647d
android
bigvul
1
null
null
null
DO NOT MERGE mm-video-v4l2: vdec: add safety checks for freeing buffers Allow only up to 64 buffers on input/output port (since the allocation bitmap is only 64-wide). Do not allow changing theactual buffer count while still holding allocation (Client can technically negotiate buffer count on a free/disabled port) Add safety checks to free only as many buffers were allocated. Fixes: Security Vulnerability - Heap Overflow and Possible Local Privilege Escalation in MediaServer (libOmxVdec problem #3) Bug: 27532282 27661749 Change-Id: I06dd680d43feaef3efdc87311e8a6703e234b523
46e305be6e670a5a0041b0b4861122a0f1aabefa
android
bigvul
1
null
null
null
DO NOT MERGE mm-video-v4l2: vidc: validate omx param/config data Check the sanity of config/param strcuture objects passed to get/set _ config()/parameter() methods. Bug: 27533317 Security Vulnerability in MediaServer omx_vdec::get_config() Can lead to arbitrary write Change-Id: I6c3243afe12055ab94f1a1ecf758c10e88231809 Conflicts: mm-core/inc/OMX_QCOMExtns.h mm-video-v4l2/vidc/vdec/src/omx_vdec_msm8974.cpp mm-video-v4l2/vidc/venc/src/omx_video_base.cpp mm-video-v4l2/vidc/venc/src/omx_video_encoder.cpp
560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8
android
bigvul
1
null
null
null
DO NOT MERGE mm-video-v4l2: vdec: deprecate unused config OMX_IndexVendorVideoExtraData This config (used to set header offline) is no longer used. Remove handling this config since it uses non-process-safe ways to pass memory pointers. Fixes: Security Vulnerability - Segfault in MediaServer (libOmxVdec problem #2) Bug: 27475409 Change-Id: I7a535a3da485cbe83cf4605a05f9faf70dcca42f
f22c2a0f0f9e030c240468d9d18b9297f001bcf0
android
bigvul
1
null
null
null
Fix size check for OMX_IndexParamConsumerUsageBits since it doesn't follow the OMX convention. And remove support for the kClientNeedsFrameBuffer flag. Bug: 27207275 Change-Id: Ia2c119e2456ebf9e2f4e1de5104ef9032a212255
0bb5ced60304da7f61478ffd359e7ba65d72f181
android
bigvul
1
null
null
null
external/libvpx/libwebm: Update snapshot Update libwebm snapshot. This update contains security fixes from upstream. Upstream git hash: 229f49347d19b0ca0941e072b199a242ef6c5f2b BUG=23167726 Change-Id: Id3e140e7b31ae11294724b1ecfe2e9c83b4d4207 (cherry picked from commit d0281a15b3c6bd91756e453cc9398c5ef412d99a)
cc274e2abe8b2a6698a5c47d8aa4bb45f1f9538d
android
bigvul
1
null
null
null
h264dec: check for overflows when calculating allocation size. Bug: 27855419 Change-Id: Idabedca52913ec31ea5cb6a6109ab94e3fb2badd
2b6f22dc64d456471a1dc6df09d515771d1427c8
android
bigvul
1
null
null
null
OpenSSLCipher: multiple calls to updateAAD were ignored Do to a missing assignment statement, only the first call to updateAAD was honored and the rest were discarded. (cherry picked from commit a23b05b327b9d8fefc44276c2fa80278ef210c0f) Bug: 27371173 Change-Id: I77ad7800b0905f72d5abe76b56352a94056ceb9c
8bec47d2184fca7e8b7337d2a65b2b75a9bc8f54
android
bigvul
1
null
null
null
Fix updateAAD when offset is not 0 Due to AAD data not being reset when a Cipher instance was re-used, this bug was never uncovered by tests that actually exercise this case. (cherry picked from commit 95cf7b9b7fbabb77cd341f17da79c947bcc934ab) Bug: 27696681 Bug: 27324690 Change-Id: Iae9b5794f212a8fc4eeff2a651332e7490f5cada
1638945d4ed9403790962ec7abed1b7a232a9ff8
android
bigvul
1
null
null
null
BQ: fix some uninitialized variables Bug 27555981 Bug 27556038 Change-Id: I436b6fec589677d7e36c0e980f6e59808415dc0e
a30d7d90c4f718e46fb41a99b3d52800e1011b73
android
bigvul
1
null
null
null
Don't allow cachedFile Attachments if the content Uri is pointing to EmailProvider. This is to backport a security fix reported by b/27308057 and b/27335139. Also, add Analytics for these errors. Bug: b/27335139 Change-Id: I75f6d8f5feb9fc611aa2e429e2b22cbd07223ab9
a55168330d9326ff2120285763c818733590266a
android
bigvul
1
null
null
null
[DO NOT MERGE] Disallow guest user from changing Wifi settings Disallow existing and newly created guest users from changing Wifi settings. BUG: 27411179 TEST: Flashed device, switched to existing guest user, and verified that Wifi settings are disabled. TEST: Flashed device, created new guest user, and verified that Wifi settings are disabled. Change-Id: Ia1bf4cce0369017b62f69d317c7ab2e30e3949b3
12332e05f632794e18ea8c4ac52c98e82532e5db
android
bigvul
1
null
null
null