commit_msg
stringlengths 1
24.2k
| commit_hash
stringlengths 2
84
⌀ | project
stringlengths 2
40
| source
stringclasses 4
values | labels
int64 0
1
| repo_url
stringlengths 26
70
⌀ | commit_url
stringlengths 74
118
⌀ | commit_date
stringlengths 25
25
⌀ |
---|---|---|---|---|---|---|---|
SoftMPEG4: Check the buffer size before writing the reference frame.
Also prevent overflow in SoftMPEG4 and division by zero in SoftMPEG4Encoder.
Bug: 30033990
Change-Id: I7701f5fc54c2670587d122330e5dc851f64ed3c2
(cherry picked from commit 695123195034402ca76169b195069c28c30342d3)
| d4271b792bdad85a80e2b83ab34c4b30b74f53ec | android | bigvul | 1 | null | null | null |
Fix vulnerability in LockSettings service
Fixes bug 30003944
Change-Id: I8700d4424c6186c8d5e71d2fdede0223ad86904d
(cherry picked from commit 2d71384a139ae27cbc7b57f06662bf6ee2010f2b)
| 96daf7d4893f614714761af2d53dfb93214a32e4 | android | bigvul | 1 | null | null | null |
ServiceManager: Allow system services running as secondary users to add services
This should be reverted when all system services have been cleaned up to not
do this. A process looking up a service while running in the background will
see the service registered by the active user (assuming the service is
registered on every user switch), not the service registered by the user that
the process itself belongs to.
BUG: 30795333
Change-Id: I1b74d58be38ed358f43c163692f9e704f8f31dbe
(cherry picked from commit e6bbe69ba739c8a08837134437aaccfea5f1d943)
| 047eec456943dc082e33220d28abb7df4e089f69 | android | bigvul | 1 | null | null | null |
OMXCodec: check IMemory::pointer() before using allocation
Bug: 29421811
Change-Id: I0a73ba12bae4122f1d89fc92e5ea4f6a96cd1ed1
| 97837bb6cbac21ea679843a0037779d3834bed64 | android | bigvul | 1 | null | null | null |
Make TTY broadcasts protected
Currently, any app can broadcast the intent to update the TTY mode. This
change updates the intents to protected broadcasts so that only system
can broadcast them. Otherwise, a SecurityException will be thown.
Bug: 29832693
Change-Id: Ic9a91be3d8d15043e3165b766348cff301dd5da1
| d1d248d10cf03498efb7041f1a8c9c467482a19d | android | bigvul | 1 | null | null | null |
Fix string equality comparison
Don't use "==" to compare strings.
Bug: 25624963
Change-Id: Id25696e4fdcbcf4d48ec74e8ed65c1a33716b30c
| 81be4e3aac55305cbb5c9d523cf5c96c66604b39 | android | bigvul | 1 | null | null | null |
stop exporting EmailAccountCacheProvider
Bug: 29767043
Change-Id: Ib9f16385a5e63557b6f293d148e49c9ad044c9b4
| cb2dfe43f25cb0c32cc73aa4569c0a5186a4ef43 | android | bigvul | 1 | null | null | null |
Region: Detect malicious overflow in unflatten
Bug 29983260
Change-Id: Ib6e1cb8ae279010c5e9960aaa03513f55b7d873b
| 363247929c35104b3e5ee9e637e9dcf579080aee | android | bigvul | 1 | null | null | null |
adb: use asocket's close function when closing.
close_all_sockets was assuming that all registered local sockets used
local_socket_close as their close function. However, this is not true
for JDWP sockets.
Bug: http://b/28347842
Change-Id: I40a1174845cd33f15f30ce70828a7081cd5a087e
(cherry picked from commit 53eb31d87cb84a4212f4850bf745646e1fb12814)
| 014b01706cc64dc9c2ad94a96f62e07c058d0b5d | android | bigvul | 1 | null | null | null |
Pre-setup restrictions
- Prevent external tiles from system apps
- Disable help
Bug: 29194585
Change-Id: I92da498110db49f7a523d6f775f191c4b52a4ad6
| e206f02d46ae5e38c74d138b51f6e1637e261abe | android | bigvul | 1 | null | null | null |
Do not allow premium SMS during SuW
Bug: 29420123
Change-Id: I41ef7138635f11fbe7f495dd81103458cb969c35
(cherry picked from commit 15f55ca2f204e664807e047b5f898693b274bab6)
| b8d1aee993dcc565e6576b2f2439a8f5a507cff6 | android | bigvul | 1 | null | null | null |
Disallow shell to mutate always-on vpn when DISALLOW_CONFIG_VPN user restriction is set
Fix: 29899712
Change-Id: I38cc9d0e584c3f2674c9ff1d91f77a11479d8943
(cherry picked from commit 9c7b706cf4332b4aeea39c166abca04b56685280)
| 335702d106797bce8a88044783fa1fc1d5f751d0 | android | bigvul | 1 | null | null | null |
Don't allow enable/disable of tuner on lockscreen
Change-Id: Id9748ea39a8fa03b67d3fa6f91da530dd5cf9409
Fixes: 30107438
| 6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5 | android | bigvul | 1 | null | null | null |
debuggerd: verify that traced threads belong to the right process.
Fix two races in debuggerd's PTRACE_ATTACH logic:
1. The target thread in a crash dump request could exit between the
/proc/<pid>/task/<tid> check and the PTRACE_ATTACH.
2. Sibling threads could exit between listing /proc/<pid>/task and the
PTRACE_ATTACH.
Bug: http://b/29555636
Change-Id: I4dfe1ea30e2c211d2389321bd66e3684dd757591
| d7603583f90c2bc6074a4ee2886bd28082d7c65b | android | bigvul | 1 | null | null | null |
Check uid for notification policy access.
Bug: 29421441
Change-Id: Ia0a7b06112dde1c925ec3232f50bf4d90b17b5e5
(cherry picked from commit 0cd1b789567b60b963fc7b8935e898ea0e61a617)
| 61e9103b5725965568e46657f4781dd8f2e5b623 | android | bigvul | 1 | null | null | null |
DO NOT MERGE add private function convertSafeLable
Bug: 28557603
Change-Id: I8d6a13a71011c38e7dd7039fa7ae0a69cf6adc2e
| b2c89e6f8962dc7aff88cb38aa3ee67d751edda9 | android | bigvul | 1 | null | null | null |
VenueNameElement: fix off-by-one enum bounds check
Fix the off-by-one error in the conditionals that check
whether the Venue Group and Venue Type codes in the ANQP
element are in the "Reserved" range.
BUG: 30169673
BUG: 29464811
TEST: Manually set up AP with Hotspot 2.0 support, broadcasting
Venue Group value 0xc, and ensure that device does not
crash when in range of this AP.
Change-Id: I14adc3a919e19b67fc0f46bf09d0cffb88b5354e
(cherry picked from commit 48ee5f1e1c6e2a2dc63e9cb84c42f532c8a6847a)
| 35a86eef3c0eef760f7e61c52a343327ba601630 | android | bigvul | 1 | null | null | null |
DO NOT MERGE | libvpx: cherry-pick aa1c813 from upstream
Description from upstream:
vp9: Fix potential SEGV in decoder_peek_si_internal
decoder_peek_si_internal could potentially read more bytes than
what actually exists in the input buffer. We check for the buffer
size to be at least 8, but we try to read up to 10 bytes in the
worst case. A well crafted file could thus cause a segfault.
Likely change that introduced this bug was:
https://chromium-review.googlesource.com/#/c/70439 (git hash:
7c43fb6)
Bug: 30013856
Change-Id: If556414cb5b82472d5673e045bc185cc57bb9af3
(cherry picked from commit bd57d587c2eb743c61b049add18f9fd72bf78c33)
| 4974dcbd0289a2530df2ee2a25b5f92775df80da | android | bigvul | 1 | null | null | null |
Fix corruption via buffer overflow in mediaserver
change unbound sprintf() to snprintf() so network-provided values
can't overflow the buffers.
Applicable to all K/L/M/N branches.
Bug: 25747670
Change-Id: Id6a5120c2d08a6fbbd47deffb680ecf82015f4f6
| 68f67ef6cf1f41e77337be3bc4bff91f3a3c6324 | android | bigvul | 1 | null | null | null |
Fix NULL pointer dereference
Bug: 29770686
Bug: 23304983
Change-Id: I1648aab90bc281702a00744bf884ae8bb8009412
| cadfb7a3c96d4fef06656cf37143e1b3e62cae86 | android | bigvul | 1 | null | null | null |
Fixed error concealment when no MBs are decoded in the current pic
Bug: 29493002
Change-Id: I3fae547ddb0616b4e6579580985232bd3d65881e
| 7109ce3f8f90a28ca9f0ee6e14f6ac5e414c62cf | android | bigvul | 1 | null | null | null |
Block user from setting safe boot setting via adb
Bug: 29900345
Change-Id: Id3b4472b59ded2c7c29762ddf008ee8486009dbb
| 91fc934bb2e5ea59929bb2f574de6db9b5100745 | android | bigvul | 1 | null | null | null |
DO NOT MERGE Block the user from entering safe boot mode
Block the user from entering safe boot mode if the DISALLOW_SAFE_BOOT
policy is set.
Bug: 26251884
Change-Id: I4945d5d676928346c11ea305a5b6a2e1a42e94e6
| 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | android | bigvul | 1 | null | null | null |
fix build
Change-Id: I9bb8c659d3fc97a8e748451d82d0f3448faa242b
| 9f9ba255a0c59544f3555c9c45512c3a2fac5fad | android | bigvul | 1 | null | null | null |
SoftMP3: memset safely
Bug: 29422022
Change-Id: I70c9e33269d16bf8c163815706ac24e18e34fe97
| c2639afac631f5c1ffddf70ee8a6fe943d0bedf9 | android | bigvul | 1 | null | null | null |
omx: prevent input port enable/disable for software codecs
Bug: 29421804
Change-Id: Iba1011e9af942a6dff7f659af769a51e3f5ba66f
| 1e9801783770917728b7edbdeff3d0ec09c621ac | android | bigvul | 1 | null | null | null |
stagefright: fix possible stack overflow in AVCC reassemble
Additionally, remove use of variable length array which is
non-standard in C++.
Bug: 29161888
Change-Id: Ifdc3e7435f2225214c053b13f3bfe71c7d0ff506
| 119a012b2a9a186655da4bef3ed4ed8dd9b94c26 | android | bigvul | 1 | null | null | null |
DO NOT MERGE: Remove the use of JHEAD in ExifInterface
Bug: 29270469
Change-Id: I6a6c8aeab2a842ff1646316363d614851625e78f
| e739d9ca5469ed30129d0fa228e3d0f2878671ac | android | bigvul | 1 | null | null | null |
libutils/Unicode.cpp: Correct length computation and add checks for utf16->utf8
Inconsistent behaviour between utf16_to_utf8 and utf16_to_utf8_length
is causing a heap overflow.
Correcting the length computation and adding bound checks to the
conversion functions.
Test: ran libutils_tests
Bug: 29250543
Change-Id: I6115e3357141ed245c63c6eb25fc0fd0a9a7a2bb
(cherry picked from commit c4966a363e46d2e1074d1a365e232af0dcedd6a1)
| ecf5fd58a8f50362ce9e8d4245a33d56f29f142b | android | bigvul | 1 | null | null | null |
Use SSL_session_reused to check when a session was reused
The returned session_id could be exactly the same in the case of TLS
session tickets, so use the SSL_session_reused API to determine exactly
when a session was reused.
(cherry picked from commit 1115fa0f6dbbff3a913fbce39ca98f9a78425c72)
Bug: 28751153
Change-Id: Ie82e4d1bb326d7e7deb7981a1e57df393f6c0e1f
| 5af5e93463f4333187e7e35f3bd2b846654aa214 | android | bigvul | 1 | null | null | null |
DO NOT MERGE Fix potential DoS caused by delivering signal to BT process
Bug: 28885210
Change-Id: I63866d894bfca47464d6e42e3fb0357c4f94d360
Conflicts:
btif/co/bta_hh_co.c
btif/src/btif_core.c
Merge conflict resolution of ag/1161415 (referencing ag/1164670)
- Directly into mnc-mr2-release
| 472271b153c5dc53c28beac55480a8d8434b2d5c | android | bigvul | 1 | null | null | null |
DO NOT MERGE Disable app pinning when emergency call button pressed
Also disables app pinning when the "return to call" button is pressed
and brings up the in-call screen when app pinning is stopped if there is
an existing call.
Combination of ag/1091397 and ag/1085584 adapted for MNC.
Bug: 28558307
Bug: 28761672
Change-Id: I82ec4042bff387c845ce571b197a4a86e1dd5ec8
| 468651c86a8adb7aa56c708d2348e99022088af3 | android | bigvul | 1 | null | null | null |
Deal correctly with short strings
The parseMacAddress function anticipates only properly formed
MAC addresses (6 hexadecimal octets separated by ":"). This
change properly deals with situations where the string is
shorter than expected, making sure that the passed in char*
reference in parseHexByte never exceeds the end of the string.
BUG: 28164077
TEST: Added a main function:
int main(int argc, char **argv) {
unsigned char addr[6];
if (argc > 1) {
memset(addr, 0, sizeof(addr));
parseMacAddress(argv[1], addr);
printf("Result: %02x:%02x:%02x:%02x:%02x:%02x\n",
addr[0], addr[1], addr[2], addr[3], addr[4], addr[5]);
}
}
Tested with "", "a" "ab" "ab:c" "abxc".
Change-Id: I0db8d0037e48b62333d475296a45b22ab0efe386
| a209ff12ba9617c10550678ff93d01fb72a33399 | android | bigvul | 1 | null | null | null |
Add FrameStats default constructor
Bug 28592402
Change-Id: I857e46c9ab3ffae0d96923d665d13a4128a6cafa
| 3bcf0caa8cca9143443814b36676b3bae33a4368 | android | bigvul | 1 | null | null | null |
DO NOT MERGE mm-video-v4l2: venc: add checks before accessing heap pointers
Heap pointers do not point to user virtual addresses in case
of secure session.
Set them to NULL and add checks to avoid accesing them
Bug: 28815329
Bug: 28920116
Change-Id: I94fd5808e753b58654d65e175d3857ef46ffba26
| 7558d03e6498e970b761aa44fff6b2c659202d95 | android | bigvul | 1 | null | null | null |
DO NOT MERGE: Camera: Adjust pointers to ANW buffers to avoid infoleak
Subtract address of a random static object from pointers being routed
through app process.
Bug: 28466701
Change-Id: Idcbfe81e9507433769672f3dc6d67db5eeed4e04
| 1f24c730ab6ca5aff1e3137b340b8aeaeda4bdbc | android | bigvul | 1 | null | null | null |
Add pm operation to set user restrictions.
Bug: 29189712
Change-Id: I6fdb3b68dfe3f51119e5ce8008880fc7d9c793df
| 4e4743a354e26467318b437892a9980eb9b8328a | android | bigvul | 1 | null | null | null |
Don't trust callers to supply app info to bindBackupAgent()
Get the canonical identity and metadata about the package from the
Package Manager at time of usage rather than rely on the caller to
have gotten things right, even when the caller has the system uid.
Bug 28795098
Change-Id: I215786bc894dedf7ca28e9c80cefabd0e40ca877
Merge conflict resolution for ag/1133474 (referencing ag/1148862)
- directly to mnc-mr2-release
| e7cf91a198de995c7440b3b64352effd2e309906 | android | bigvul | 1 | null | null | null |
backport security fix: avoid set NITZ time to 2038
Bug: 29083635
Change-Id: I21c5f4147d8146f92b7e33f0967a179ae644a263
| f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | android | bigvul | 1 | null | null | null |
SoftAAC2: fix crash on all-zero adts buffer
Bug: 29153599
Change-Id: I1cb81c054098b86cf24f024f8479909ca7bc85a6
| 8e438e153f661e9df8db0ac41d587e940352df06 | android | bigvul | 1 | null | null | null |
Decoder: Initialize first_pb_nal_in_pic for error slices
first_pb_nal_in_pic was uninitialized for error clips
Bug: 29023649
Change-Id: Ie4e0a94059c5f675bf619e31534846e2c2ca58ae
| 326fe991a4b7971e8aeaf4ac775491dd8abd85bb | android | bigvul | 1 | null | null | null |
Decoder: Do not conceal slices with invalid SPS/PPS
Bug: 28835995
| 7554755536019e439433c515eeb44e701fb3bfb2 | android | bigvul | 1 | null | null | null |
SoftHEVC: Exit gracefully in case of decoder errors
Exit for error in allocation and unsupported resolutions
Bug: 28816956
Change-Id: Ieb830bedeb3a7431d1d21a024927df630f7eda1e
| a4567c66f4764442c6cb7b5c1858810194480fb5 | android | bigvul | 1 | null | null | null |
Check effect command reply size in AudioFlinger
Bug: 29251553
Change-Id: I1bcc1281f1f0542bb645f6358ce31631f2a8ffbf
| 9cd8c3289c91254b3955bd7347cf605d6fa032c6 | android | bigvul | 1 | null | null | null |
DO NOT MERGE Fix wrong nAllocLen
Set nAllocLen to the size of the opaque handle itself.
Bug: 28816964
Bug: 28816827
Change-Id: Id410e324bee291d4a0018dddb97eda9bbcded099
| d575ecf607056d8e3328ef2eb56c52e98f81e87d | android | bigvul | 1 | null | null | null |
DO NOT MERGE omx: check buffer port before using
Bug: 28816827
Change-Id: I3d5bad4a1ef96dec544b05bb31cc6f7109aae0a5
| b351eabb428c7ca85a34513c64601f437923d576 | android | bigvul | 1 | null | null | null |
Fix possible out of bounds access
Bug: 28868315
Change-Id: I2b416c662f9ad7f9b3c6cf973a39c6693c66775a
| bae671597d47b9e5955c4cb742e468cebfd7ca6b | android | bigvul | 1 | null | null | null |
Don't use sp<>&
because they may end up pointing to NULL after a NULL check was performed.
Bug: 28166152
Change-Id: Iab2ea30395b620628cc6f3d067dd4f6fcda824fe
| 42a25c46b844518ff0d0b920c20c519e1417be69 | android | bigvul | 1 | null | null | null |
Decoder: Fix slice number increment for error clips
Bug: 28673410
| a78887bcffbc2995cf9ed72e0697acf560875e9e | android | bigvul | 1 | null | null | null |
Fix potential overflow
Bug: 28533562
Change-Id: I798ab24caa4c81f3ba564cad7c9ee019284fb702
| 590d1729883f700ab905cdc9ad850f3ddd7e1f56 | android | bigvul | 1 | null | null | null |
Check malloc result to avoid NPD
Bug: 28471206
Change-Id: Id5d055d76893d6f53a2e524ff5f282d1ddca3345
| e7142a0703bc93f75e213e96ebc19000022afed9 | android | bigvul | 1 | null | null | null |
Fixed out of bound read in flush_bits
Bug: 28168413
Change-Id: I3db5432a08daf665e160c0dab2d1928a576418b4
| d1c775d1d8d2ed117d1e026719b7f9f089716597 | android | bigvul | 1 | null | null | null |
Clear unused pointer field when sending across binder
Bug: 28377502
Change-Id: Iad5ebfb0a9ef89f09755bb332579dbd3534f9c98
| daef4327fe0c75b0a90bb8627458feec7a301e1f | android | bigvul | 1 | null | null | null |
Don't pass URL path and username/password to PAC scripts
The URL path could contain credentials that apps don't want exposed
to a potentially malicious PAC script.
Bug: 27593919
Change-Id: I4bb0362fc91f70ad47c4c7453d77d6f9a1e8eeed
| ec2fc50d202d975447211012997fe425496c849c | android | bigvul | 1 | null | null | null |
Remove generic socket access from untrusted processes
SELinux defines various classes for various socket types, including
tcp_socket, udp_socket, rawip_socket, netlink_socket, etc. Socket
classes not known to the SELinux kernel code get lumped into the generic
"socket" class. In particular, this includes the AF_MSM_IPC socket
class.
Bluetooth using apps were granted access to this generic socket class at
one point in 2012. In 1601132086b054adc70e7f8f38ed24574c90bc37,
a TODO was added indicating that this access was likely unnecessary. In
cb835a2852997dde0be2941173f8c879ebbef157, an auditallow was added to
test to see if this rule was actually used, and in master branch
d0113ae0aed1a455834f26ec847b6ca8610e3b16, this rule was completely
deleted.
Revoke access to the generic socket class for isolated_app,
untrusted_app, and shell for older Android releases. This is
conceptually a backport of d0113ae0aed1a455834f26ec847b6ca8610e3b16, but
affecting fewer domains to avoid potential breakage.
Add a neverallow rule asserting that this rule isn't present for the
untrusted domains. Contrary to our usual conventions, the neverallow
rule is placed in bluetooth.te, to avoid merge conflicts and simplify
patching.
Bug: 28612709
Bug: 25768265
Change-Id: Ibfbb67777e448784bb334163038436f3c4dc1b51
| abf0663ed884af7bc880a05e9529e6671eb58f39 | android | bigvul | 1 | null | null | null |
Verify setForegroundDispatch caller is in foreground.
Bug: 28300969
Change-Id: Icadfe70cd06f921badd266e7a4efbae15a8c206a
| 9ea802b5456a36f1115549b645b65c791eff3c2c | android | bigvul | 1 | null | null | null |
Add guest mode functionality (2/3)
Add a flag to enable() to start Bluetooth in restricted
mode. In restricted mode, all devices that are paired during
restricted mode are deleted upon leaving restricted mode.
Right now restricted mode is only entered while a guest
user is active.
Bug: 27410683
Change-Id: I8f23d28ef0aa3a8df13d469c73005c8e1b894d19
| 37c88107679d36c419572732b4af6e18bb2f7dce | android | bigvul | 1 | null | null | null |
Backport of backup transport whitelist
Sysconfig define a whitelist of permitted backup transports
Previously any apk bundled in priv-app could insert a backup transport.
Reduce risk surface by giving the OEM explicit control over who is
allowed to handle backup data.
Bug 28406080
Backport of 494df791728f4d42d67e935c327910975993ad29 from N
Change-Id: I9f90e324169a68720d608f74754d284a7e59cf87
| 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | android | bigvul | 1 | null | null | null |
Fix potential buffer overrun.
BUG=27840771
Change-Id: I240f188b2e8f4b45d90138cfb3b14869cf506452
| 338aeaf28e9981c15d0673b18487dba61eb5447c | android | bigvul | 1 | null | null | null |
Fix scanf %s in lsof.
Bug: http://b/28175237
Change-Id: Ief0ba299b09693ad9afc0e3d17a8f664c2fbb8c2
| ae18eb014609948a40e22192b87b10efc680daa7 | android | bigvul | 1 | null | null | null |
Check partword is in range for # of partitions
and reformat tabs->spaces for readability.
Bug: 28556125
Change-Id: Id02819a6a5bcc24ba4f8a502081e5cb45272681c
| 659030a2e80c38fb8da0a4eb68695349eec6778b | android | bigvul | 1 | null | null | null |
Decoder: Set u1_long_term_reference_flag to 0 for error concealment
For MBs which are in error, set u1_long_term_reference_flag to zero.
This ensures latest frame is used for concealment
Bug: 28470138
Change-Id: I58eab5bc1da277823f3dbb4103ba50867f8935dc
| d4841f1161bdb5e13cb19e81af42437a634dd6ef | android | bigvul | 1 | null | null | null |
limit mediaserver memory
Limit mediaserver using rlimit, to prevent it from bringing down the system
via the low memory killer.
Default max is 65% of total RAM, but can be customized via system property.
Bug: 28471206
Bug: 28615448
Change-Id: Ic84137435d1ef0a6883e9789a4b4f399e4283f05
| 6fdee2a83432b3b150d6a34f231c4e2f7353c01e | android | bigvul | 1 | null | null | null |
Backport ChooserTarget package source check from N
Fix a bug where a ChooserTargetService could supply a ChooserTarget
pointing at a non-exported activity outside of its own package and
have it launch.
Bug 28384423
Change-Id: I3f5854f91c5695ad9253d71055ef58224df47008
| ddbf2db5b946be8fdc45c7b0327bf560b2a06988 | android | bigvul | 1 | null | null | null |
DO NOT MERGE Update libpng to 1.6.20
BUG:23265085
Change-Id: I85199805636d771f3597b691b63bc0bf46084833
(cherry picked from commit bbe98b40cda082024b669fa508931042eed18f82)
| 9d4853418ab2f754c2b63e091c29c5529b8b86ca | android | bigvul | 1 | null | null | null |
Correctly handle dup() failure in Parcel::readNativeHandle
bail out if dup() fails, instead of creating an invalid native_handle_t
Bug: 28395952
Change-Id: Ia1a6198c0f45165b9c6a55a803e5f64d8afa0572
| 54cb02ad733fb71b1bdf78590428817fb780aff8 | android | bigvul | 1 | null | null | null |
Fix missing permission check when saving pattern/password
Fixes bug 28163930
Change-Id: Ic98ef20933b352159b88fdef331e83e9ef6e1f20
| e83f0f6a5a6f35323f5367f99c8e287c440f33f5 | android | bigvul | 1 | null | null | null |
Further restrict socket ioctls available to apps
Restrict unix_dgram_socket and unix_stream_socket to a whitelist
for all domains. Remove ioctl permission for netlink_selinux_socket and
netlink_route_socket for netdomain.
Bug: 28171804
Bug: 27424603
Change-Id: I650639115b8179964ae690a39e4766ead0032d2e
| 556bb0f55324e8839d7b735a0de9bc31028e839e | android | bigvul | 1 | null | null | null |
DO NOT MERGE mm-video-v4l2: venc: Avoid processing ETBs/FTBs in invalid states
(per the spec) ETB/FTB should not be handled in states other than
Executing, Paused and Idle. This avoids accessing invalid buffers.
Also add a lock to protect the private-buffers from being deleted
while accessing from another thread.
Bug: 27903498
Security Vulnerability - Heap Use-After-Free and Possible LPE in
MediaServer (libOmxVenc problem #3)
CRs-Fixed: 1010088
Change-Id: I898b42034c0add621d4f9d8e02ca0ed4403d4fd3
| 4ed06d14080d8667d5be14eed200e378cba78345 | android | bigvul | 1 | null | null | null |
DO NOT MERGE mm-video-v4l2: vdec: Avoid processing ETBs/FTBs in invalid states
(per the spec) ETB/FTB should not be handled in states other than
Executing, Paused and Idle. This avoids accessing invalid buffers.
Also add a lock to protect the private-buffers from being deleted
while accessing from another thread.
Bug: 27890802
Security Vulnerability - Heap Use-After-Free and Possible LPE in
MediaServer (libOmxVdec problem #6)
CRs-Fixed: 1008882
Change-Id: Iaac2e383cd53cf9cf8042c9ed93ddc76dba3907e
| 5b82f4f90c3d531313714df4b936f92fb0ff15cf | android | bigvul | 1 | null | null | null |
DO NOT MERGE Fix AudioEffect reply overflow
Bug: 28173666
Change-Id: I055af37a721b20c5da0f1ec4b02f630dcd5aee02
| 073a80800f341325932c66818ce4302b312909a4 | android | bigvul | 1 | null | null | null |
DO NOT MERGE btif: check overflow on create_pbuf size
Bug: 27930580
Change-Id: Ieb1f23f9a8a937b21f7c5eca92da3b0b821400e6
| 514139f4b40cbb035bb92f3e24d5a389d75db9e6 | android | bigvul | 1 | null | null | null |
Decoder: Memset few structures to zero to handle error clips
Bug: 27907656
Change-Id: I671d135dd5c324c39b4ede990b7225d52ba882cd
| ecf6c7ce6d5a22d52160698aab44fc234c63291a | android | bigvul | 1 | null | null | null |
Decoder: Fix for handling invalid intra mode
Bug: 28165659
Change-Id: I2291a287c27291695f4f3d6e753b6bbd7dfd9e42
| a583270e1c96d307469c83dc42bd3c5f1b9ef63f | android | bigvul | 1 | null | null | null |
Fix slice params for interlaced video
Bug: 28165661
Change-Id: I912a86bd78ebf0617fd2bc6eb2b5a61afc17bf53
| cc676ebd95247646e67907ccab150fb77a847335 | android | bigvul | 1 | null | null | null |
MPEG4Extractor: ensure kKeyTrackID exists before creating an MPEG4Source as track.
GenericSource: return error when no track exists.
SampleIterator: make sure mSamplesPerChunk is not zero before using it as divisor.
Bug: 21657957
Bug: 23705695
Bug: 22802344
Bug: 28799341
Change-Id: I7664992ade90b935d3f255dcd43ecc2898f30b04
(cherry picked from commit 0386c91b8a910a134e5898ffa924c1b6c7560b13)
| f81038006b4c59a5a148dcad887371206033c28f | android | bigvul | 1 | null | null | null |
h264bsdActivateParamSets: Prevent multiplication overflow.
Report MEMORY_ALLOCATION_ERROR if pStorage->picSizeInMbs would
exceed UINT32_MAX bytes.
Bug: 28532266
Change-Id: Ia6f11efb18818afcdb5fa2a38a14f2a2d8c8447a
| 60547808ca4e9cfac50028c00c58a6ceb2319301 | android | bigvul | 1 | null | null | null |
Fix security vulnerability in libstagefright
bug: 28175045
Change-Id: Icee6c7eb5b761da4aa3e412fb71825508d74d38f
| e248db02fbab2ee9162940bc19f087fd7d96cb9d | android | bigvul | 1 | null | null | null |
Check section size when verifying CRC
Bug: 28333006
Change-Id: Ief7a2da848face78f0edde21e2f2009316076679
| 4f236c532039a61f0cf681d2e3c6e022911bbb5c | android | bigvul | 1 | null | null | null |
Kill the real/isolated uid group, not the ApplicationInfo uid
This is a direct reimplementation in L of fixes applied to N in
these two commits:
8dc8d37c1d7d694016f1ec2b3cea5fb723567be8
e8741d23d2dd05c4cb3fed5ee6a4040ee96a60e3
Bug 19285814
Change-Id: I59bcc8f1d41c426e9da635bea9ad1d7c6756d5aa
Resolve merge conflict when cp'ing ag/941553 to mnc-mr1-release branch
| 9878bb99b77c3681f0fda116e2964bac26f349c3 | android | bigvul | 1 | null | null | null |
AudioSource: initialize variables
to prevent info leak
Bug: 27855172
Change-Id: I3d33e0a9cc5cf8a758d7b0794590b09c43a24561
| dd3546765710ce8dd49eb23901d90345dec8282f | android | bigvul | 1 | null | null | null |
DO NOT MERGE Fix intent filter priorities
Since this is a backport, there is only one rule that guards intent
filter priorities:
1) Updates will NOT be granted a priority greater than the priority
defined on the system image.
Bug: 27450489
Change-Id: Ifcec4d7a59e684331399abc41eea1bd6876155a4
| a75537b496e9df71c74c1d045ba5569631a16298 | android | bigvul | 1 | null | null | null |
DO NOT MERGE Take advantage of new MotionEvent flag to prevent tapjacking.
Bug: 26677796
Change-Id: I563541f0a42564b854af0f8037c1d4741c79a2ac
Fix merge conflict when cp'ing ag/903239 to mnc-mr1-release
| 2068c7997265011ddc5e4dfa3418407881f7f81e | android | bigvul | 1 | null | null | null |
SampleTable.cpp: Fixed a regression caused by a fix for bug
28076789.
Detail: Before the original fix
(Id207f369ab7b27787d83f5d8fc48dc53ed9fcdc9) for 28076789, the
code allowed a time-to-sample table size to be 0. The change
made in that fix disallowed such situation, which in fact should
be allowed. This current patch allows it again while maintaining
the security of the previous fix.
Bug: 28288202
Bug: 28076789
Change-Id: I1c9a60c7f0cfcbd3d908f24998dde15d5136a295
| b57b3967b1a42dd505dbe4fcf1e1d810e3ae3777 | android | bigvul | 1 | null | null | null |
Fix overflow in path building
An incorrect size was causing an unsigned value
to wrap, causing it to write past the end of
the buffer.
Bug: 28085658
Change-Id: Ie9625c729cca024d514ba2880ff97209d435a165
| 864e2e22fcd0cba3f5e67680ccabd0302dfda45d | android | bigvul | 1 | null | null | null |
DO NOT MERGE codecs: check OMX buffer size before use in (vorbis|opus)dec
Bug: 27833616
Change-Id: I1ccdd16a00741da072527a6d13e87fd7c7fe8c54
| 4e32001e4196f39ddd0b86686ae0231c8f5ed944 | android | bigvul | 1 | null | null | null |
Check mp3 output buffer size
Bug: 27793371
Change-Id: I0fe40a4cfd0a5b488f93d3f3ba6f9495235926ac
| ad40e57890f81a3cf436c5f06da66396010bd9e5 | android | bigvul | 1 | null | null | null |
codecs: check OMX buffer size before use in (gsm|g711)dec
Bug: 27793163
Bug: 27793367
Change-Id: Iec3de8a237ee2379d87a8371c13e543878c6652c
| 7cea5cb64b83d690fe02bc210bbdf08f5a87636f | android | bigvul | 1 | null | null | null |
DO NOT MERGE mm-video-v4l2: venc: add safety checks for freeing buffers
Allow only up to 64 buffers on input/output port (since the
allocation bitmap is only 64-wide).
Add safety checks to free only as many buffers were allocated.
Fixes: Heap Overflow and Possible Local Privilege Escalation in
MediaServer (libOmxVenc problem)
Bug: 27532497
Change-Id: I31e576ef9dc542df73aa6b0ea113d72724b50fc6
| 89913d7df36dbeb458ce165856bd6505a2ec647d | android | bigvul | 1 | null | null | null |
DO NOT MERGE mm-video-v4l2: vdec: add safety checks for freeing buffers
Allow only up to 64 buffers on input/output port (since the
allocation bitmap is only 64-wide).
Do not allow changing theactual buffer count while still
holding allocation (Client can technically negotiate
buffer count on a free/disabled port)
Add safety checks to free only as many buffers were allocated.
Fixes: Security Vulnerability - Heap Overflow and Possible Local
Privilege Escalation in MediaServer (libOmxVdec problem #3)
Bug: 27532282 27661749
Change-Id: I06dd680d43feaef3efdc87311e8a6703e234b523
| 46e305be6e670a5a0041b0b4861122a0f1aabefa | android | bigvul | 1 | null | null | null |
DO NOT MERGE mm-video-v4l2: vidc: validate omx param/config data
Check the sanity of config/param strcuture objects
passed to get/set _ config()/parameter() methods.
Bug: 27533317
Security Vulnerability in MediaServer
omx_vdec::get_config() Can lead to arbitrary write
Change-Id: I6c3243afe12055ab94f1a1ecf758c10e88231809
Conflicts:
mm-core/inc/OMX_QCOMExtns.h
mm-video-v4l2/vidc/vdec/src/omx_vdec_msm8974.cpp
mm-video-v4l2/vidc/venc/src/omx_video_base.cpp
mm-video-v4l2/vidc/venc/src/omx_video_encoder.cpp
| 560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8 | android | bigvul | 1 | null | null | null |
DO NOT MERGE mm-video-v4l2: vdec: deprecate unused config OMX_IndexVendorVideoExtraData
This config (used to set header offline) is no longer used. Remove handling
this config since it uses non-process-safe ways to pass memory pointers.
Fixes: Security Vulnerability - Segfault in MediaServer (libOmxVdec problem #2)
Bug: 27475409
Change-Id: I7a535a3da485cbe83cf4605a05f9faf70dcca42f
| f22c2a0f0f9e030c240468d9d18b9297f001bcf0 | android | bigvul | 1 | null | null | null |
Fix size check for OMX_IndexParamConsumerUsageBits
since it doesn't follow the OMX convention. And remove support
for the kClientNeedsFrameBuffer flag.
Bug: 27207275
Change-Id: Ia2c119e2456ebf9e2f4e1de5104ef9032a212255
| 0bb5ced60304da7f61478ffd359e7ba65d72f181 | android | bigvul | 1 | null | null | null |
external/libvpx/libwebm: Update snapshot
Update libwebm snapshot. This update contains security fixes from upstream.
Upstream git hash: 229f49347d19b0ca0941e072b199a242ef6c5f2b
BUG=23167726
Change-Id: Id3e140e7b31ae11294724b1ecfe2e9c83b4d4207
(cherry picked from commit d0281a15b3c6bd91756e453cc9398c5ef412d99a)
| cc274e2abe8b2a6698a5c47d8aa4bb45f1f9538d | android | bigvul | 1 | null | null | null |
h264dec: check for overflows when calculating allocation size.
Bug: 27855419
Change-Id: Idabedca52913ec31ea5cb6a6109ab94e3fb2badd
| 2b6f22dc64d456471a1dc6df09d515771d1427c8 | android | bigvul | 1 | null | null | null |
OpenSSLCipher: multiple calls to updateAAD were ignored
Do to a missing assignment statement, only the first call to updateAAD
was honored and the rest were discarded.
(cherry picked from commit a23b05b327b9d8fefc44276c2fa80278ef210c0f)
Bug: 27371173
Change-Id: I77ad7800b0905f72d5abe76b56352a94056ceb9c
| 8bec47d2184fca7e8b7337d2a65b2b75a9bc8f54 | android | bigvul | 1 | null | null | null |
Fix updateAAD when offset is not 0
Due to AAD data not being reset when a Cipher instance was re-used, this
bug was never uncovered by tests that actually exercise this case.
(cherry picked from commit 95cf7b9b7fbabb77cd341f17da79c947bcc934ab)
Bug: 27696681
Bug: 27324690
Change-Id: Iae9b5794f212a8fc4eeff2a651332e7490f5cada
| 1638945d4ed9403790962ec7abed1b7a232a9ff8 | android | bigvul | 1 | null | null | null |
BQ: fix some uninitialized variables
Bug 27555981
Bug 27556038
Change-Id: I436b6fec589677d7e36c0e980f6e59808415dc0e
| a30d7d90c4f718e46fb41a99b3d52800e1011b73 | android | bigvul | 1 | null | null | null |
Don't allow cachedFile Attachments if the content Uri is pointing to EmailProvider.
This is to backport a security fix reported by b/27308057 and b/27335139.
Also, add Analytics for these errors.
Bug: b/27335139
Change-Id: I75f6d8f5feb9fc611aa2e429e2b22cbd07223ab9
| a55168330d9326ff2120285763c818733590266a | android | bigvul | 1 | null | null | null |
[DO NOT MERGE] Disallow guest user from changing Wifi settings
Disallow existing and newly created guest users from
changing Wifi settings.
BUG: 27411179
TEST: Flashed device, switched to existing guest user, and verified
that Wifi settings are disabled.
TEST: Flashed device, created new guest user, and verified that Wifi
settings are disabled.
Change-Id: Ia1bf4cce0369017b62f69d317c7ab2e30e3949b3
| 12332e05f632794e18ea8c4ac52c98e82532e5db | android | bigvul | 1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.