commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
Decoder: Initialize default reference buffers for all pictures Reference buffer is now initialized to default value for each pic before decoding the first slice in the pic Bug: 34097866 Change-Id: Id64b123af2188217ce833f11db0e6c0681d41dfd
f634481e940421020e52f511c1fb34aac1db4b2f
android
bigvul
1
null
null
null
Decoder: Fixes an out of bound write in bitstream buffer [for mnc-dr-dev and later; mnc-dev gets a different patch] After emulation prevention, data is written as an int, so at least 3 additional bytes should be available. And since bitstream functions read 8 bytes ahead, 8 extra bytes should be available in the bitstream buffer. Bug: 33934721 Change-Id: I444ec6f85d01b0bade9f827e15c4b476779d6c69
33ef7de9ddc8ea7eb9cbc440d1cf89957a0c267b
android
bigvul
1
null
null
null
eas_mdls: fix OOB read. Bug: 34031018 Change-Id: I8d373c905f64286b23ec819bdbee51368b12e85a
56d153259cc3e16a6a0014199a2317dde333c978
android
bigvul
1
null
null
null
Fix in handling wrong cu_qp_delta cu_qp_delta is now checked for the range as specified in the spec Bug: 33966031 Change-Id: I00420bf68081af92e9f2be9af7ce58d0683094ca
01ca88bb6c5bdd44e071f8effebe12f1d7da9853
android
bigvul
1
null
null
null
Handle invalid num_reorder_pics & max_dec_pic_buffering in SPS Bug: 33864300 Change-Id: I920e45c3420a1a41a366ad45bd4186c5f6af6d6b
1ab5ce7e42feccd49e49752e6f58f9097ac5d254
android
bigvul
1
null
null
null
Decoder: Moved end of pic processing to end of decode call ih264d_end_of_pic() was called after parsing slice of a new picture. This is now being done at the end of decode of the current picture. decode_gaps_in_frame_num which needs frame_num of new slice is now done after decoding frame_num in new slice. This helps in handling errors in picaff streams with gaps in frames Bug: 33588051 Bug: 33641588 Bug: 34097231 Change-Id: I1a26e611aaa2c19e2043e05a210849bd21b22220
494561291a503840f385fbcd11d9bc5f4dc502b8
android
bigvul
1
null
null
null
Fix security vulnerability: Equalizer command might allow negative indexes Bug: 32247948 Bug: 32438598 Bug: 32436341 Test: use POC on bug or cts security test Change-Id: I91bd6aadb6c7410163e03101f365db767f4cd2a3 (cherry picked from commit 0872b65cff9129633471945431b9a5a28418049c) (cherry picked from commit e981cca9fff3608af22bdf8fc1acef5470e25663)
c66c43ad571ed2590dcd55a762c73c90d9744bac
android
bigvul
1
null
null
null
Fix security vulnerability: Effect command might allow negative indexes Bug: 32448258 Bug: 32095626 Test: Use POC bug or cts security test Change-Id: I69f24eac5866f8d9090fc4c0ebe58c2c297b63df (cherry picked from commit 01183402d757f0c28bfd5e3b127b3809dfd67459)
321ea5257e37c8edb26e66fe4ee78cca4cd915fe
android
bigvul
1
null
null
null
DO NOT MERGE: defensive parsing of mp3 album art information several points in stagefrights mp3 album art code used strlen() to parse user-supplied strings that may be unterminated, resulting in reading beyond the end of a buffer. This changes the code to use strnlen() for 8-bit encodings and strengthens the parsing of 16-bit encodings similarly. It also reworks how we watch for the end-of-buffer to avoid all over-reads. Bug: 32377688 Test: crafted mp3's w/ good/bad cover art. See what showed in play music Change-Id: Ia9f526d71b21ef6a61acacf616b573753cd21df6 (cherry picked from commit fa0806b594e98f1aed3ebcfc6a801b4c0056f9eb)
7a3246b870ddd11861eda2ab458b11d723c7f62c
android
bigvul
1
null
null
null
Visualizer: Check capture size and latency parameters Bug: 31781965 Change-Id: I1c439a0d0f6aa0057b3c651499f28426e1e1f5e4 (cherry picked from commit 9a2732ba0a8d609ab040d2c1ddee28577ead9772)
557bd7bfe6c4895faee09e46fc9b5304a956c8b7
android
bigvul
1
null
null
null
vp8:fix threading issues 1 - stops de allocating before threads are closed. 2 - limits threads to mb_rows when mb_rows < partitions BUG=webm:851 Bug: 30436808 Change-Id: Ie017818ed28103ca9d26d57087f31361b642e09b (cherry picked from commit 70cca742efa20617c70c3209aa614a70f282f90e)
6886e8e0a9db2dbad723dc37a548233e004b33bc
android
bigvul
1
null
null
null
Make VBRISeeker more robust Bug: 32577290 Change-Id: I9bcc9422ae7dd3ae4a38df330c9dcd7ac4941ec8 (cherry picked from commit 7fdd36418e945cf6a500018632dfb0ed8cb1a343)
453b351ac5bd2b6619925dc966da60adf6b3126c
android
bigvul
1
null
null
null
Handle invalid slice_address in slice header If an invalid slice_address was parsed, it was resulting in an incomplete slice header during decode stage. Fix this by not incrementing slice_idx for ignore slice error Bug: 32322258 Change-Id: I8638d7094d65f4409faa9b9e337ef7e7b64505de (cherry picked from commit f4f3556e04a9776bcc776523ae0763e7d0d5c668)
a33f6725d7e9f92330f995ce2dcf4faa33f6433f
android
bigvul
1
null
null
null
Tremolo: fix ARM assembly code for decode_map type 3 case Bug: 31647370 Test: ran CTS and manual PoC tests Change-Id: If176cee6c267d9025d5c6af49c19354192f901a9 (cherry picked from commit 798ceb60518ebbc9eb2f5005a83cd7779eabb879)
5dc99237d49e73c27d3eca54f6ccd97d13f94de0
android
bigvul
1
null
null
null
Ensure that NLSF cannot be negative when computing a min distance between them b/31607432 Signed-off-by: Jean-Marc Valin <[email protected]> (cherry picked from commit d9d5ac4027c5ee1da2ff1c6572ae3b35a845db19)
0d052d64480a30e83fcdda80f4774624e044beb7
android
bigvul
1
null
null
null
Pull latest code from upstream okhttp and okio This change contains the OkHttp and Okio changes without modification. The only additions are the MODULE_LICENSE_APACHE2 files. This corresponds closely to OkHttp 2.5.0 and Okio 1.6.0. Behavior changes are documented in CHANGELOG.md. This change does not compile as is. The next commit makes the Android modifications required. okhttp: 4305dc3fabeab392eb56f2db51538e06c3a54e51 okio: 313436764bf35794e158c6171e319fee868298df Change-Id: I97ce07ff0472cdbce09f588863a1e5ccdcea0c20
71b9f47b26fb57ac3e436a19519c6e3ec70e86eb
android
bigvul
1
null
null
null
Check memory allocation in ISoundTriggerHwService Add memory allocation check in ISoundTriggerHwService::listModules(). Bug: 19385640. Change-Id: Iaf74b6f154c3437e1bfc9da78b773d64b16a7604
b9096dc
android
bigvul
1
null
null
null
DO NOT MERGE - audio policy service: fix possible memory overflow Add limit on number of audio ports and patches requested by listaudioPorts() and listAudioPatches(). Bug: 19261727. Change-Id: I21dfdf11cf805734cc3b7b2a85762c5598f60580 (cherry picked from commit 1d670b11313250442455a22f1056ad649d607fb2)
null
android
bigvul
1
null
null
null
Fix crash when user provides large values in the Parcel. Bug: 18102648 Change-Id: Ie6a24718e586a34424238363de80f9545951514f (cherry-picked from commit 8afa1c4ab86d724feb7716e153b7835385534590)
#F0
android
bigvul
1
null
null
null
Set optlen for UDP-encap check in XfrmController When setting the socket owner for an encap socket XfrmController will first attempt to verify that the socket has the UDP-encap socket option set. When doing so it would pass in an uninitialized optlen parameter which could cause the call to not modify the option value if the optlen happened to be too short. So for example if the stack happened to contain a zero where optlen was located the check would fail and the socket owner would not be changed. Fix this by setting optlen to the size of the option value parameter. Test: run cts -m CtsNetTestCases BUG: 111650288 Change-Id: I57b6e9dba09c1acda71e3ec2084652e961667bd9 (cherry picked from commit fc42a105147310bd680952d4b71fe32974bd8506)
931418b16c7197ca2df34c2a5609e49791125abe
android
bigvul
1
null
null
null
Checks the SMP length to fix OOB read Bug: 111937065 Test: manual Change-Id: I330880a6e1671d0117845430db4076dfe1aba688 Merged-In: I330880a6e1671d0117845430db4076dfe1aba688 (cherry picked from commit fceb753bda651c4135f3f93a510e5fcb4c7542b8)
6e4b8e505173f803a5fc05abc09f64eef89dc308
android
bigvul
1
null
null
null
Add packet length check in smp_proc_master_id Bug: 111937027 Test: manual Change-Id: I1144c9879e84fa79d68ad9d5fece4f58e2a3b075 (cherry picked from commit c8294662d07a98e9b8b1cab1ab681ec0805ce4e8)
198888b8e0163bab7a417161c63e483804ae8e31
android
bigvul
1
null
null
null
DO NOT MERGE Fix OOB read before buffer length check Bug: 111936834 Test: manual Change-Id: Ib98528fb62db0d724ebd9112d071e367f78e369d (cherry picked from commit 4548f34c90803c6544f6bed03399f2eabeab2a8e)
e8bbf5b0889790cf8616f4004867f0ff656f0551
android
bigvul
1
null
null
null
Check packet length in bta_av_proc_meta_cmd Bug: 111893951 Test: manual - connect A2DP Change-Id: Ibbf347863dfd29ea3385312e9dde1082bc90d2f3 (cherry picked from commit ed51887f921263219bcd2fbf6650ead5ec8d334e)
30cec963095366536ca0b1306089154e09bfe1a9
android
bigvul
1
null
null
null
Add missing AVRCP message length checks inside avrc_msg_cback Explicitly check the length of the received message before accessing the data. Bug: 111803925 Bug: 79883824 Test: POC scripts Change-Id: I00b1c6bd6dd7e18ac2c469ef2032c7ff10dcaecb Merged-In: I00b1c6bd6dd7e18ac2c469ef2032c7ff10dcaecb (cherry picked from commit 282deb3e27407aaa88b8ddbdbd7bb7d56ddc635f) (cherry picked from commit 007868d05f4b761842c7345161aeda6fd40dd245)
830cb39cb2a0f1bf6704d264e2a5c5029c175dd7
android
bigvul
1
null
null
null
Add packet length checks in mca_ccb_hdl_req Bug: 110791536 Test: manual Change-Id: Ica5d8037246682fdb190b2747a86ed8d44c2869a (cherry picked from commit 4de7ccdd914b7a178df9180d15f675b257ea6e02)
5216e6120160b28d76e9ee4dff9995e772647511
android
bigvul
1
null
null
null
Fix copy length calculation in sdp_copy_raw_data Test: compilation Bug: 110216176 Change-Id: Ic4a19c9f0fe8cd592bc6c25dcec7b1da49ff7459 (cherry picked from commit 23aa15743397b345f3d948289fe90efa2a2e2b3e)
11fb7aa03437eccac98d90ca2de1730a02a515e2
android
bigvul
1
null
null
null
Check remaining frame length in rfc_process_mx_message Bug: 111936792 Bug: 80432928 Test: manual Change-Id: Ie2c09f3d598fb230ce060c9043f5a88c241cdd79 (cherry picked from commit 0471355c8b035aaa2ce07a33eecad60ad49c5ad0)
92a7bf8c44a236607c146240f3c0adc1ae01fedf
android
bigvul
1
null
null
null
Disable changing lock when device is not provisioned. When the device is not yet provisioned and settings is launched: - disable the entry point for changing device lock - remove the search panel from settings home page - remove the search menu Bug: 110034419 Test: make RunSettingsRoboTests Change-Id: Ieb7eb0e8699229ec0824ccc19d7b958ac44965a2 Merged-In: Ieb7eb0e8699229ec0824ccc19d7b958ac44965a2 (cherry picked from commit 770f4abf9de2bb7d74497cc4b5f6795023229ef2)
5e43341b8c7eddce88f79c9a5068362927c05b54
android
bigvul
1
null
null
null
Fix information disclosure in mediadrmserver Test:POC provided in bug Bug:79218474 Change-Id: Iba12c07a5e615f8ed234b01ac53e3559ba9ac12e (cherry picked from commit c1bf68a8d1321d7cdf7da6933f0b89b171d251c6)
bf7a67c33c0f044abeef3b9746f434b7f3295bb1
android
bigvul
1
null
null
null
RESTRICT AUTOMERGE: Cherry-pick "begin cleanup of malloc porting layer" Bug: 78354855 Test: Not feasible Original description: ======================================================================== 1. Merge some of the allocators into sk_malloc_flags by redefining a flag to mean zero-init 2. Add more private helpers to simplify our call-sites (and handle some overflow mul checks) 3. The 2-param helpers rely on the saturating SkSafeMath::Mul to pass max_size_t as the request, which should always fail. chromium: 508641 Reviewed-on: https://skia-review.googlesource.com/90940 Commit-Queue: Mike Reed <[email protected]> Reviewed-by: Robert Phillips <[email protected]> Reviewed-by: Stephan Altmueller <[email protected]> ======================================================================== Conflicts: - include/private/SkMalloc.h Simply removed the old definitions of SK_MALLOC_TEMP and SK_MALLOC_THROW. - public.bzl Copied SK_SUPPORT_LEGACY_MALLOC_PORTING_LAYER into the old defines. - src/codec/SkIcoCodec.cpp Drop a change where we were not using malloc yet. - src/codec/SkBmpBaseCodec.cpp - src/core/SkBitmapCache.cpp These files weren't yet using malloc (and SkBmpBaseCodec hadn't been factored out). - src/core/SkMallocPixelRef.cpp These were still using New rather than Make (return raw pointer). Leave them unchanged, as sk_malloc_flags is still valid. - src/lazy/SkDiscardableMemoryPool.cpp Leave this unchanged; sk_malloc_flags is still valid In addition, pull in SkSafeMath.h, which was originally introduced in https://skia-review.googlesource.com/c/skia/+/33721. This is required for the new sk_malloc calls. Also pull in SkSafeMath::Add and SkSafeMath::Mul, introduced in https://skia-review.googlesource.com/88581 Also add SK_MaxSizeT, which the above depends on, introduced in https://skia-review.googlesource.com/57084 Also, modify NewFromStream to use sk_malloc_canfail, matching pi and avoiding a build break Change-Id: Ib320484673a865460fc1efb900f611209e088edb (cherry picked from commit a12cc3e14ea6734c7efe76aa6a19239909830b28)
77c955200ddd1761d6ed7a6c1578349fedbb55e4
android
bigvul
1
null
null
null
Adding check for min_width and min_height Add check for min_wd and min_ht. Stride is updated if header decode is done. Bug: 74078669 Change-Id: Ided95395e1138335dbb4b05131a8551f6f7bbfcd (cherry picked from commit 84eba4863dd50083951db83ea3cc81e015bf51da)
bef16671c891e16f25a7b174bc528eea109357be
android
bigvul
1
null
null
null
Fix for stack corruption in esbr Bug: 110769924 Test: poc from bug before/after Change-Id: I99c6e89902064849ea1310c271064bdeccf7f20e (cherry picked from commit 7e90d745c22695236437297cd8167a9312427a4a) (cherry picked from commit 5464927f0c1fc721fa03d1c5be77b0b43dfffc50)
04e8cd58f075bec5892e369c8deebca9c67e855c
android
bigvul
1
null
null
null
DO NOT MERGE. Execute "strict" queries with extra parentheses. SQLiteQueryBuilder has a setStrict() mode which can be used to detect SQL attacks from untrusted sources, which it does by running each query twice: once with an extra set of parentheses, and if that succeeds, it runs the original query verbatim. This sadly doesn't catch inputs of the type "1=1) OR (1=1", which creates valid statements for both tests above, but the final executed query ends up leaking data due to SQLite operator precedence. Instead, we need to continue compiling both variants, but we need to execute the query with the additional parentheses to ensure data won't be leaked. Test: atest cts/tests/tests/database/src/android/database/sqlite/cts/SQLiteQueryBuilderTest.java Bug: 111085900 Change-Id: I6e8746fa48f9de13adae37d2990de11c9c585381 Merged-In: I6e8746fa48f9de13adae37d2990de11c9c585381 (cherry picked from commit 57b04a86802ff879af78e782a8582462323e34e7)
462aaeaa616e0bb1342e8ef7b472acc0cbc93deb
android
bigvul
1
null
null
null
DO NOT MERGE. Persistable Uri grants still require permissions. When FLAG_GRANT_PERSISTABLE_URI_PERMISSION is requested, we still need to check permissions between the source and target packages, instead of shortcutting past them. The spirit of the original change is remains intact: if the caller requested FLAG_GRANT_PERSISTABLE_URI_PERMISSION, then we avoid returning "-1", which would prevent the grant data structure from being allocated. Bug: 111934948 Test: atest android.appsecurity.cts.AppSecurityTests Change-Id: Ief0fc922aa09fc3d9bb6a126c2ff5855347cd030 Merged-In: Ief0fc922aa09fc3d9bb6a126c2ff5855347cd030 (cherry picked from commit d6a6e7127cc341ca875d9d13cf7a864d9f20b479)
962fb40991f15be4f688d960aa00073683ebdd20
android
bigvul
1
null
null
null
Check for overflow of crypto size Bug: 111603051 Test: CTS Change-Id: Ib5b1802b9b35769a25c16e2b977308cf7a810606 (cherry picked from commit d1fd02761236b35a336434367131f71bef7405c9)
2b4667baa5a2badbdfec1794156ee17d4afef37c
android
bigvul
1
null
null
null
Backport: Fix Object.entries/values with changing elements Bug: 111274046 Test: m -j proxy_resolver_v8_unittest && adb sync && adb shell \ /data/nativetest64/proxy_resolver_v8_unittest/proxy_resolver_v8_unittest Change-Id: I705fc512cc5837e9364ed187559cc75d079aa5cb (cherry picked from commit d8be9a10287afed07705ac8af027d6a46d4def99)
a24543157ae2cdd25da43e20f4e48a07481e6ceb
android
bigvul
1
null
null
null
DO NOT MERGE AVRC: Copy browse.p_browse_data in btif_av_event_deep_copy p_msg_src->browse.p_browse_data is not copied, but used after the original pointer is freed Bug: 109699112 Test: manual Change-Id: I1d014eb9a8911da6913173a9b11218bf1c89e16e (cherry picked from commit 1d9a58768e6573899c7e80c2b3f52e22f2d8f58b)
dd28d8ddf2985d654781770c691c60b45d7f32b4
android
bigvul
1
null
null
null
Fix overflow in sei user data parsing Bug: 37968960 Bug: 65484460 Test: ran POC post-patch Change-Id: I73e91b4b2976b954b5fd4f29182d6072abbc7f70
9f0fb67540d2259e4930d9bd5f1a1a6fb95af862
android
bigvul
1
null
null
null
Fix crash during cursor moving on BiDi text The crash was introduced by Ib66ef392c19c937718e7101f6d48fac3abe51ad0 The root cause of the crashing is requesting out-of-line access for the horizontal width. This invalid access is silently ignored by TextLine#measure() method but new implementation end up with out of bounds access. To makes behavior as old implementation, calling getHorizontal instead of accessing measured result array. Bug: 78464361, 111580019 Test: Manually done Change-Id: I5c5778718f6b397adbb1e4f2cf95e9f635f6e5c8 (cherry picked from commit 960647d582911ae7ab8b9491097898e6c313aaf1) Merged-In: I5c5778718f6b397adbb1e4f2cf95e9f635f6e5c8 (cherry picked from commit a1076fdaa54ebf56bb32bea43fb278f7470ff307)
54f661b16b308cf38d1b9703214591c0f83df64d
android
bigvul
1
null
null
null
Adding Error Check for f_code Parameters In MPEG1, the valid range for the forward and backward f_code parameters is [1, 7]. Adding a check to enforce this. Without the check, the value could be 0. We read (f_code - 1) bits from the stream and reading a negative number of bits from the stream is undefined. Bug: 64550583 Test: monitored temp ALOGD() output Change-Id: Ia452cd43a28e9d566401f515947164635361782f (cherry picked from commit 71d734b83d72e8a59f73f1230982da97615d2689)
29a78a11844fc027fa44be7f8bd8dc1cf8bf89f6
android
bigvul
1
null
null
null
Decoder: Detect change of mbaff flag in SPS Change in Mbaff flag needs re-initialization of NMB group and other variables in decoder context. Bug: 64380237 Test: ran poc on ASAN before/after Change-Id: I0fc65e4dfc3cc2c15528ec52da1782ecec61feab (cherry picked from commit d524ba03101c0c662c9d365d7357536b42a0265e)
42cf02965b11c397dd37a0063e683cef005bc0ae
android
bigvul
1
null
null
null
Decoder: Increased allocation and added checks in sei parsing. This prevents heap overflow while parsing sei_message. Bug: 63122634 Test: ran PoC on unpatched/patched Change-Id: I61c1ff4ac053a060be8c24da4671db985cac628c (cherry picked from commit f2b70d353768af8d4ead7f32497be05f197925ef)
e86d3cfd2bc28dac421092106751e5638d54a848
android
bigvul
1
null
null
null
Fix edge case when applying id3 unsynchronization Bug: 63100526 Test: opened poc, other files Change-Id: I0a51a2a11d0ea84ede0c075de650a7118f0e00c5 (cherry picked from commit 3e70296461c5f260988ab21854a6f43fdafea764)
dd3ca4d6b81a9ae2ddf358b7b93d2f8c010921f5
android
bigvul
1
null
null
null
Skip composition of frames lacking a color map Bug:68399117 Change-Id: I32f1d6856221b8a60130633edb69da2d2986c27c (cherry picked from commit 0dc887f70eeea8d707cb426b96c6756edd1c607d)
ede8f95361dcbf9757aaf6d25ce59fa3767344e3
android
bigvul
1
null
null
null
DO NOT MERGE | libvpx: Fix OOB caused by odd frame width. Keep behaviors unchanged without external allocation. Bug: b/64710201 Test: poc provided in the bug. Change-Id: I319a47b64c7cfa7bb47ad01c702be6f2acffe3a4 (cherry picked from commit 51721c34847e6b4f935d5ecb1b44931c7716fd59) (cherry picked from commit 28a641201287106fbb73dfbad35dae2756cde265)
55cd1dd7c8d0a3de907d22e0f12718733f4e41d9
android
bigvul
1
null
null
null
Decoder: Handle ps_codec_obj memory allocation failure gracefully If memory allocation for ps_codec_obj fails, return gracefully with an error code. All other allocation failures are handled correctly. Bug: 68299873 Test: before/after with always-failing malloc Change-Id: I5e6c07b147b13df81e65476851662d4b55d33b83 (cherry picked from commit a966e2a65dd901151ce7f4481d0084840c9a0f7e)
3ed3c6b79a7b9a60c475dd4936ad57b0b92fd600
android
bigvul
1
null
null
null
Decoder: Handle dec_hdl memory allocation failure gracefully If memory allocation for dec_hdl fails, return gracefully with an error code. All other allocation failures are handled correctly. Bug: 68300072 Test: ran poc before/after Change-Id: I118ae71f4aded658441f1932bd4ede3536f5028b (cherry picked from commit 7720b3fe3de04523da3a9ecec2b42a3748529bbd)
5acaa6fc86c73a750e5f4900c4e2d44bf22f683a
android
bigvul
1
null
null
null
Fix out of bound memory access in lppTransposer In TRANSPOSER_SETTINGS, initialize the whole bwBorders array to a reasonable value to guarantee correct termination in while loop in lppTransposer function. This fixes the reported bug. For completeness: - clear the whole bwIndex array instead of noOfPatches entries only. - abort criterion in while loop to prevent potential infinite loop, and limit bwIndex[patch] to a valid range. Test: see bug for malicious content, decoded with "stagefright -s -a" Bug: 65280786 Change-Id: I16ed2e1c0f1601926239a652ca20a91284151843 (cherry picked from commit 6d3dd40e204bf550abcfa589bd9615df8778e118)
8e3be529372892e20ccf196809bc73276c822189
android
bigvul
1
null
null
null
Fix prev slice incomplete check Bug: 64552185 Bug: 65034175 Move the decision to signal missing ctbs as skipped ctbs of previous slice to the end of current slice hdr parsing to ensure no error in slice hdr parsing. Change-Id: Ia33b4be31dad6225b04e7b20b9000059c87941c4 (cherry picked from commit 74f35f191022c06863dacd33a3651a33be3ef08d) (cherry picked from commit 9c24714e25d6ba713549a573df1d496479dce2b1)
7c9be319a279654e55a6d757265f88c61a16a4d5
android
bigvul
1
null
null
null
Decoder: Fixed incorrect use of mmco parameters. Added extra structure to read mmco values and copied only once per picture. Bug: 65735716 Change-Id: I25b08a37bc78342042c52957774b089abce1a54b (cherry picked from commit 3c70b9a190875938fc57164d9295a3ec791554df)
6c327afb263837bc90760c55c6605b26161a4eb9
android
bigvul
1
null
null
null
Set error skip ctbs as multiple 8x8 pus Bug: 65123471 This is required for incomplete ctbs at the frame boundaries Change-Id: I7e41a3ac2f6e35a929ba4ff3ca4cfcc859a7b867
2b9fb0c2074d370a254b35e2489de2d94943578d
android
bigvul
1
null
null
null
DO NOT MERGE: Use correct limit for port values no upstream report yet, add it here when we have it issue found & patch by nmehta@ Bug: 36555370 Change-Id: Ibf1efea554b95f514e23e939363d608021de4614 (cherry picked from commit b62884fb49fe92081e414966d9b5fe58250ae53c)
51e0cb2e5ec18eaf6fb331bc573ff27b743898f4
android
bigvul
1
null
null
null
DO NOT MERGE: Add validation for eternal enities https://bugzilla.gnome.org/show_bug.cgi?id=780691 Bug: 36556310 Change-Id: I9450743e167c3c73af5e4071f3fc85e81d061648 (cherry picked from commit bef9af3d89d241bcb518c20cba6da2a2fd9ba049)
308396a55280f69ad4112d4f9892f4cbeff042aa
android
bigvul
1
null
null
null
DO NOT MERGE: Ensure that unparcelling Region only reads the expected number of bytes bug: 20883006 Change-Id: I4f109667fb210a80fbddddf5f1bfb7ef3a02b6ce
1e72dc7a3074cd0b44d89afbf39bbf5000ef7cc3
android
bigvul
1
null
null
null
DO NOT MERGE Change to add STK_PERMISSION for stk related commands. And make stk commands protected. Bug: 21697171 Change-Id: I7649c7341428194963ac74e9ae622dfa76ea738b
b48581401259439dc5ef6dcf8b0f303e4cbefbe9
android
bigvul
1
null
null
null
DO NOT MERGE Change to make STK related intents protected. Bug: 21697171 Change-Id: I7649c7341428194963ac74e9ae622dfa76ea738b
fcb1d13c320dd1a6350bc7af3166929b4d54a456
android
bigvul
1
null
null
null
IOMX: Add buffer range check to emptyBuffer Bug: 20634516 Change-Id: If351dbd573bb4aeb6968bfa33f6d407225bc752c (cherry picked from commit d971df0eb300356b3c995d533289216f43aa60de)
086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab
android
bigvul
1
null
null
null
Prevent integer overflow when allocating native_handle_t User specified values of numInts and numFds can overflow and cause malloc to allocate less than we expect, causing heap corruption in subsequent operations on the allocation. Bug: 19334482 Change-Id: I43c75f536ea4c08f14ca12ca6288660fd2d1ec55
e8c62fb484151f76ab88b1d5130f38de24ac8c14
android
bigvul
1
null
null
null
DO NOT MERGE: IOMX: work against metadata buffer spoofing - Prohibit direct set/getParam/Settings for extensions meant for OMXNodeInstance alone. This disallows enabling metadata mode without the knowledge of OMXNodeInstance. - Use a backup buffer for metadata mode buffers and do not directly share with clients. - Disallow setting up metadata mode/tunneling/input surface after first sendCommand. - Disallow store-meta for input cross process. - Disallow emptyBuffer for surface input (via IOMX). - Fix checking for input surface. Bug: 29422020 Change-Id: I801c77b80e703903f62e42d76fd2e76a34e4bc8e (cherry picked from commit 7c3c2fa3e233c656fc8c2fc2a6634b3ecf8a23e8)
0f177948ae2640bfe4d70f8e4248e106406b3b0a
android
bigvul
1
null
null
null
IOMX: do not clear buffer if it's allocated by component The component might depends on their buffers to be initialized in certain ways to work. Don't clear unless we're allocating it. bug: 31586647 Change-Id: Ia0a125797e414998ef0cd8ce03672f5b1e0bbf7a (cherry picked from commit ea76573aa276f51950007217a97903c4fe64f685)
640b04121d7cd2cac90e2f7c82b97fce05f074a5
android
bigvul
1
null
null
null
IOMX: do not convert ANWB to gralloc source in emptyBuffer Bug: 29422020 Bug: 31412859 Change-Id: If48e3e0b6f1af99a459fdc3f6f03744bbf0dc375 (cherry picked from commit 534bb6132a6a664f90b42b3ef81298b42efb3dc2)
2c75e1c3b98e4e94f50c63e2b7694be5f948477c
android
bigvul
1
null
null
null
Fix build breakage caused by commit 940829f69b52d6038db66a9c727534636ecc456d. Change-Id: I4776db4a26fb3c31bb994d48788373fe569c812a (cherry picked from commit baa9146401e28c5acf54dea21ddd197f0d3a8fcd)
c48ef757cc50906e8726a3bebc3b60716292cdba
android
bigvul
1
null
null
null
ServiceManager: Restore basic uid check Prevent apps from registering services without relying on selinux checks. Bug: 29431260 Change-Id: I38c6e8bc7f7cba1cbd3568e8fed1ae7ac2054a9b (cherry picked from commit 2b74d2c1d2a2c1bb6e9c420f7e9b339ba2a95179)
d3c6ce463ac91ecbeb2128beb475d31d3ca6ef42
android
bigvul
1
null
null
null
WifiEnterpriseConfiguration: Do not print credentials in toString BUG:25624963 Change-Id: I939a12a27d6b915d8a9cc8b142f645fba0ee42ec
55271d454881b67ff38485fdd97598c542cc2d55
android
bigvul
1
null
null
null
adb: switch the socket list mutex to a recursive_mutex. sockets.cpp was branching on whether a socket close function was local_socket_close in order to avoid a potential deadlock if the socket list lock was held while closing a peer socket. Bug: http://b/28347842 Change-Id: I5e56f17fa54275284787f0f1dc150d1960256ab3 (cherry picked from commit 9b587dec6d0a57c8fe1083c1c543fbeb163d65fa)
268068f25673242d1d5130d96202d3288c91b700
android
bigvul
1
null
null
null
Pre-setup restrictions - Don't let user settings run Bug: 29194585 Change-Id: Ia9c46c7ba04ce2809304bebe8a4c5cdac2108611
bd5d5176c74021e8cf4970f93f273ba3023c3d72
android
bigvul
1
null
null
null
SoftVPX: fix nFilledLen overflow Bug: 29421675 Change-Id: I25d4cf54a5df22c2130c37e95c7c7f75063111f3
630ed150f7201ddadb00b8b8ce0c55c4cc6e8742
android
bigvul
1
null
null
null
Fix build Change-Id: I48ba34b3df9c9a896d4b18c3f48e41744b7dab54
c17ad2f0c7e00fd1bbf01d0dfed41f72d78267ad
android
bigvul
1
null
null
null
Fix build Change-Id: I96a9c437eec53a285ac96794cc1ad0c8954b27e0
3c4edac2a5b00dec6c8579a0ee658cfb3bb16d94
android
bigvul
1
null
null
null
Add bound checks to utf16_to_utf8 Bug: 29250543 Change-Id: I518e7b2fe10aaa3f1c1987586a09b1110aff7e1a (cherry picked from commit 7e93b2ddcb49b5365fbe1dab134ffb38e6f1c719)
1f4b49e64adf4623eefda503bca61e253597b9bf
android
bigvul
1
null
null
null
Add bound checks to utf16_to_utf8 Bug: 29250543 Change-Id: I3518416e89ed901021970958fb6005fd69129f7c (cherry picked from commit 1d3f4278b2666d1a145af2f54782c993aa07d1d9)
3944c65637dfed14a5a895685edfa4bacaf9f76e
android
bigvul
1
null
null
null
Add bound checks to utf16_to_utf8 Test: ran libaapt2_tests64 Bug: 29250543 Change-Id: I1ebc017af623b6514cf0c493e8cd8e1d59ea26c3 (cherry picked from commit 4781057e78f63e0e99af109cebf3b6a78f4bfbb6)
866dc26ad4a98cc835d075b627326e7d7e52ffa1
android
bigvul
1
null
null
null
Reduce shell power over user management. Remove MANAGE_USERS permission from shell and whitelist it for some specific functionality. Bug: 29189712 Change-Id: Ifb37448c091af91991964511e3efb1bb4dea1ff3
01875b0274e74f97edf6b0d5c92de822e0555d03
android
bigvul
1
null
null
null
Add guest mode functionality (3/3) Add a flag to enable() to start Bluetooth in restricted mode. In restricted mode, all devices that are paired during restricted mode are deleted upon leaving restricted mode. Right now restricted mode is only entered while a guest user is active. Bug: 27410683 Change-Id: If4a8855faf362d7f6de509d7ddc7197d1ac75cee
122feb9a0b04290f55183ff2f0384c6c53756bd8
android
bigvul
1
null
null
null
Add guest mode functionality (1/3) Add a flag to enable() to start Bluetooth in restricted mode. In restricted mode, all devices that are paired during restricted mode are deleted upon leaving restricted mode. Right now restricted mode is only entered while a guest user is active Bug: 27410683 Change-Id: I994a2933fd60301927ff2df65da634f81d4c9428
8b3d5a64c3c8d010ad4517f652731f09107ae9c5
android
bigvul
1
null
null
null
Decoder: Initialize slice parameters before concealing error MBs Also memset ps_dec_op structure to zero. For error input, this ensures dimensions are initialized to zero Bug: 28165661 Change-Id: I66eb2ddc5e02e74b7ff04da5f749443920f37141
e629194c62a9a129ce378e08cb1059a8a53f1795
android
bigvul
1
null
null
null
Resolve a merge issue between lmp and lmp-mr1+ Change-Id: I336cb003fb7f50fd7d95c30ca47e45530a7ad503 (cherry picked from commit 33f6da1092834f1e4be199cfa3b6310d66b521c0) (cherry picked from commit bb3a0338b58fafb01ac5b34efc450b80747e71e4)
d112f7d0c1dbaf0368365885becb11ca8d3f13a4
android
bigvul
1
null
null
null
Add new MotionEvent flag for partially obscured windows. Due to more complex window layouts resulting in lots of overlapping windows, the policy around FLAG_WINDOW_IS_OBSCURED has changed to only be set when the point at which the window was touched is obscured. Unfortunately, this doesn't prevent tapjacking attacks that overlay the dialog's text, making a potentially dangerous operation seem innocuous. To avoid this on particularly sensitive dialogs, introduce a new flag that really does tell you when your window is being even partially overlapped. We aren't exposing this as API since we plan on making the original flag more robust. This is really a workaround for system dialogs since we generally know their layout and screen position, and that they're unlikely to be overlapped by other applications. Bug: 26677796 Change-Id: I9e336afe90f262ba22015876769a9c510048fd47
03a53d1c7765eeb3af0bc34c3dff02ada1953fbf
android
bigvul
1
null
null
null
Add new, hidden MotionEvent flag for partially obscured windows. Bug: 26677796 Change-Id: Ic4219b883bb760495e6172ef61e84e9725876ef6
613f63b938145bb86cd64fe0752eaf5e99b5f628
android
bigvul
1
null
null
null
Resolve merge conflict when cp'ing ag/931301 to mnc-mr1-release Change-Id: I079d1db2d30d126f8aed348bd62451acf741037d
45737cb776625f17384540523674761e6313e6d4
android
bigvul
1
null
null
null
codecs: check OMX buffer size before use in (h263|h264)dec Bug: 27833616 Change-Id: I0fd599b3da431425d89236ffdd9df423c11947c0
d2f47191538837e796e2b10c1ff7e1ee35f6e0ab
android
bigvul
1
null
null
null
codecs: check OMX buffer size before use in (avc|hevc|mpeg2)dec Bug: 27833616 Change-Id: Ic4045a3f56f53b08d0b1264b2a91b8f43e91b738 (cherry picked from commit 87fdee0bc9e3ac4d2a88ef0a8e150cfdf08c161d)
918eeaa29d99d257282fafec931b4bda0e3bae12
android
bigvul
1
null
null
null
DO NOT MERGE Verify OMX buffer sizes prior to access Bug: 27207275 Change-Id: I4412825d1ee233d993af0a67708bea54304ff62d
295c883fe3105b19bcd0f9e07d54c6b589fc5bff
android
bigvul
1
null
null
null
Fix OMX_IndexParamConsumerUsageBits size check Bug: 27207275 Change-Id: I9a7c9fb22a0e84a490ff09c151bd2f88141fdbc0
db829699d3293f254a7387894303451a91278986
android
bigvul
1
null
null
null
Fix initialization of AAC presentation struct Otherwise the new size checks trip on this. Bug: 27207275 Change-Id: I1f8f01097e3a88ff041b69279a6121be842f1766
94d9e646454f6246bf823b6897bd6aea5f08eda3
android
bigvul
1
null
null
null
Fix ParseElementHeader to support 0 payload elements Cherry-pick'ing Change 5c83bbec9a5f6f00a349674ddad85b753d2ea219 from upstream. This fixes regression in some edge cases for mkv playback. BUG=26499283 Change-Id: I88de03219a3d941b6b2f251d384e29c36bdd4d9b
65c49d5b382de4085ee5668732bcb0f6ecaf7148
android
bigvul
1
null
null
null
OpenSSLCipher: reset AAD when necessary AAD was not being reset correctly during init or doFinal calls thus leading to incorrect output. (cherry picked from commit 0bab7f3b89ea13eb0d0c39d9c7b60c6112f0d6a8) Bug: 27324690 Change-Id: If7806a9d7847814b60719637abceb94d8fbc8831
50d0447566db4a77d78d592f1c1b5d31096fac8f
android
bigvul
1
null
null
null
Don't allow cachedFile Attachments if the content Uri is pointing to EmailProvider. This is to backport a security fix reported by b/27308057 and b/27335139. Also, add Analytics for these errors. Bug: b/27335139 Change-Id: Iaacb34e4983cdf9a85487222ae930cb64d80a193
2791f0b33b610247ef87278862e66c6045f89693
android
bigvul
1
null
null
null
Fix AMR decoder Previous change caused EOS to be ignored. Bug: 27843673 Related-to-bug: 27662364 Change-Id: Ia148a88abc861a9b393f42bc7cd63d8d3ae349bc
daa85dac2055b22dabbb3b4e537597e6ab73a866
android
bigvul
1
null
null
null
SoftAMR: check input buffer size to avoid overflow. Bug: 27662364 Change-Id: I47380545ea7d85845e141e722b0d84f498d27145
65756b4082cd79a2d99b2ccb5b392291fd53703f
android
bigvul
1
null
null
null
ensure /data/tombstones exists on all Android devices /data/tombstones is referenced by core platform code, but is not guaranteed to exist on all Android devices. Move the directory creation out of device specific files and into the core init.rc file. Bug: https://code.google.com/p/android/issues/detail?id=93207 Change-Id: I94ae5199a6a32c4fe555ca994fc4a8345e0c9690 Bug: http://b/26403620 (cherry picked from commit 0359d778a564a5c63baba08a33484fb69eda4d1e)
669ecc2f5e80ff924fa20ce7445354a7c5bcfd98
android
bigvul
1
null
null
null
BQ: Add permission check to BufferQueueConsumer::dump Bug 27046057 Change-Id: Id7bd8cf95045b497943ea39dde49e877aa6f5c4e
85d253fab5e2c01bd90990667c6de25c282fc5cd
android
bigvul
1
null
null
null
Reject fonts with invalid ranges in cmap A corrupt or malicious font may have a negative size in its cmap range, which in turn could lead to memory corruption. This patch detects the case and rejects the font, and also includes an assertion in the sparse bit set implementation if we missed any such case. External issue: https://code.google.com/p/android/issues/detail?id=192618 Bug: 26413177 Change-Id: Icc0c80e4ef389abba0964495b89aa0fae3e9f4b2
ca8ac8acdad662230ae37998c6c4091bb39402b6
android
bigvul
1
null
null
null
libwebm: Pull from upstream Rolling mkvparser from upstream. Primarily for fixing a bug on parsing failures with certain Opus WebM files. Upstream commit hash of this pull: 574045edd4ecbeb802ee3f1d214b5510269852ae The diff is so huge because there were some style clean ups upstream. But it was ensured that there were no breaking changes when the style clean ups was done upstream. Change-Id: Ib6e907175484b4b0ae1b55ab39522ea3188ad039
04839626ed859623901ebd3a5fd483982186b59d
android
bigvul
1
null
null
null
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
5a9753fca56f0eeb9f61e342b2fccffc364f9426
android
bigvul
1
null
null
null
DO NOT MERGE Check PAH in addNewIncomingCall Check to be sure that the PhoneAccountHandle in addNewIncomingCall corresponds to an existing registered PhoneAccount in Telecom and that the PhoneAccount is enabled. Otherwise, throw a SecurityException. Bug: 26864502 Change-Id: I6bbd8a1ece821b62bee2c94decde87a41afbf8b0
2750faaa1ec819eed9acffea7bd3daf867fda444
android
bigvul
1
null
null
null
Sonivox: add SafetyNet log. Bug: 26366256 Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
24d7c408c52143bce7b49de82f3913fd8d1219cf
android
bigvul
1
null
null
null
Return error for wrong mb_type If mb_type decoded returns an invalid type of MB, then return error Bug: 26070014 Change-Id: I66abcad5de1352dd42d05b1a13bb4176153b133c
58a6822d7140137ce957c6d2fc20bae1374186c1
android
bigvul
1
null
null
null
resolve merge conflicts of 88b736a198 to lmp-dev. Change-Id: Iec3cf4fb4bf75be853a1249ee1439eb4c5b38b50
899823966e78552bb6dfd7772403a4f91471d2b0
android
bigvul
1
null
null
null