| Commit message (Collapse) | Author | Age | Files | Lines |
|\
| |
| |
| |
| |
| | |
info am: dc880988f0 am: 64b670e10a
Change-Id: If3b0d271ec214b0ec04f33639f9276d591665e36
|
| |\
| | |
| | |
| | |
| | |
| | | |
info am: dc880988f0
Change-Id: Id25465c6c5697a53b41ab5ceeb5a4ad68b6ddcb9
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
In CProgramConfig_ReadHeightExt prevent stack overflow
from invalid FrontElementHeightInfo array value.
Bug: 70637599
Test: see bug
Change-Id: I145414d81d7a7be711672c12f44b537c12eea308
|
|\| |
| | |
| | |
| | |
| | |
| | | |
info am: 08ae2e8d12 am: 99f3e5ce05 am: c48482d937
Change-Id: I3ad03691188f287aaea76280aaafc2485fe66a75
|
| |\|
| | |
| | |
| | |
| | |
| | | |
info am: 08ae2e8d12 am: 99f3e5ce05
Change-Id: I75bccc4690579a56ec343b735e94d54bbd780e92
|
| | |\
| | | |
| | | |
| | | |
| | | |
| | | | |
info am: 08ae2e8d12
Change-Id: I6afb07170037b0e27738cbe7e53dc3d733fbd874
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
In CProgramConfig_ReadHeightExt prevent stack overflow
from invalid FrontElementHeightInfo array value.
Bug: 70637599
Test: see bug
Change-Id: I145414d81d7a7be711672c12f44b537c12eea308
|
|\| | |
| | | |
| | | |
| | | |
| | | |
| | | | |
info am: 4a54666f3e am: adc8026945 am: 6dd431c768 am: 4523eae489
Change-Id: I14943f95747e93f1e85cf560fe63fa11b168c9e3
|
| |\| |
| | | |
| | | |
| | | |
| | | |
| | | | |
info am: 4a54666f3e am: adc8026945 am: 6dd431c768
Change-Id: I41f5e9a24af3c7a979c628df1be114185e02a8f7
|
| | |\|
| | | |
| | | |
| | | |
| | | |
| | | | |
info am: 4a54666f3e am: adc8026945
Change-Id: I9d3b87e62af0f54c01ced2e3aac41fa8e96cb056
|
| | | |\
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
info am: 4a54666f3e
Change-Id: If7874381cdfce6cced128082b35cbd6ab21f709d
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
In CProgramConfig_ReadHeightExt prevent stack overflow
from invalid FrontElementHeightInfo array value.
Bug: 70637599
Test: see bug
Change-Id: I145414d81d7a7be711672c12f44b537c12eea308
|
|\| | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
lmp-mr1-dev am: 5565e7791f -s ours am: e1d517a909 am: c0719825a2
am: 022a305d55
Change-Id: I15f8ada5cbf90deefb7e9d2221a58a3b8f8dd038
|
| |\| | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
lmp-mr1-dev am: 5565e7791f -s ours am: e1d517a909
am: c0719825a2
Change-Id: I526341d43af40089117110cfff2f41586121e5ff
|
| | |\| |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
lmp-mr1-dev am: 5565e7791f -s ours
am: e1d517a909
Change-Id: Id97f3b0f0b59445fe85ab7c957e84d6be65f565b
|
| | | |\|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
lmp-mr1-dev
am: 5565e7791f -s ours
Change-Id: I30f8ee01f8a715cabf8edb10edf15bad032f5001
|
| | | | |\
| | | | | |
| | | | | |
| | | | | | |
lmp-mr1-dev
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
In GetInvInt(int) function, malicious content can access memory
outside of the invCount array. Always bound access to valid
indices.
Test: see bug for malicious content, decoded with "stagefright -s -a"
Bug: 65025048
Change-Id: Id1f1582bc5afc76e3e90128d92034a5899a9b51e
|
|\| | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
2a7b438754 am: fca1027937
am: d8e897ae9e
Change-Id: Id2b60900e4abe08d2f1c1612e7c729c75f2e61c0
|
| |\| | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
am: fca1027937
Change-Id: I8803d858a432aea8fba8b7ec29ba28458e7418d8
|
| | |\| | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
am: 2a7b438754
Change-Id: If16bd906722b4a639be890fcc98bd21db253f404
|
| | | |\| |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
am: 6d3dd40e20
Change-Id: I4a2b70c82e6bc42b3a0ec00efeb100fe6971a62c
|
| | | | |/
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
In TRANSPOSER_SETTINGS, initialize the whole bwBorders array to a
reasonable value to guarantee correct termination in while loop
in lppTransposer function. This fixes the reported bug.
For completeness:
- clear the whole bwIndex array instead of noOfPatches entries only.
- abort criterion in while loop to prevent potential
infinite loop, and limit bwIndex[patch] to a valid range.
Test: see bug for malicious content, decoded with "stagefright -s -a"
Bug: 65280786
Change-Id: I16ed2e1c0f1601926239a652ca20a91284151843
|
|\| | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
am: 7462464e43
am: 2bebb8fb65
Change-Id: I4645d168431438e8bfbfc28514f21aad015633ac
|
| |\| | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
am: 7462464e43
Change-Id: I064298bc197e53e6f5a6ce1872cb77c9444d8dee
|
| | |\| |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
am: d0e8397b7b
Change-Id: If35860a327395c578e6f02b3706db0fd041e719e
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
In GetInvInt(int) function, malicious content can access memory
outside of the invCount array. Always bound access to valid
indices.
Test: see bug for malicious content, decoded with "stagefright -s -a"
Bug: 65025048
Change-Id: Iff889601828f95b82d9291075f3909922ef533ef
|
|\| | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
am: 6fac7101c6
Change-Id: If3c68bd6341d7c9eff5257ec41ca6c1a2161077c
|
| |\| | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
am: 070e7b81c0
Change-Id: Ibcddd5c0e53aaae0d26e1c33c6e42bc7268cf6a1
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
In GetInvInt(int) function, malicious content can access memory
outside of the invCount array. Always bound access to valid
indices.
Test: see bug for malicious content, decoded with "stagefright -s -a"
Bug: 65025048
Change-Id: Iff889601828f95b82d9291075f3909922ef533ef
|
|\| | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
b762ff3e4f am: 1a54e8f638 am: 78653b30e9 am: 0a20959871 am: 6318d60241 am: 7147e71a75 am: 1de50b286f
am: d110691d01
* commit 'd110691d01e15a555d84fcd98e4b275dd38b37ba':
Fix aacDecoder_drcExtractAndMap()
Change-Id: I6c009e94d626cc1dd6ec1510fd2e07c1b3a4031a
|
|/| | | |
| |/ / /
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
b762ff3e4f am: 1a54e8f638 am: 78653b30e9 am: 0a20959871 am: 6318d60241 am: 7147e71a75
am: 1de50b286f
* commit '1de50b286fdadc07f94e0d8fae69a564796ab12a':
Fix aacDecoder_drcExtractAndMap()
Change-Id: Ib1dce026d6ddc9fdfa68cc5b4213a2685dc1ac17
|
|/| | |
| |/ /
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
b762ff3e4f am: 1a54e8f638 am: 78653b30e9 am: 0a20959871 am: 6318d60241
am: 7147e71a75
* commit '7147e71a75a48009e6d2b835422767cf466813d8':
Fix aacDecoder_drcExtractAndMap()
Change-Id: I7f677fae038640739834d4c44309680b78748acf
|
| |\ \
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
b762ff3e4f am: 1a54e8f638 am: 78653b30e9 am: 0a20959871
am: 6318d60241
* commit '6318d6024194f89d809f4e22266105f27389f41b':
Fix aacDecoder_drcExtractAndMap()
Change-Id: I1a836bd8b024948f18b2d2c0e912601722f887bc
|
| |/| |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
b762ff3e4f am: 1a54e8f638 am: 78653b30e9
am: 0a20959871
* commit '0a209598713cccc4f10e9c0036df487bea5af312':
Fix aacDecoder_drcExtractAndMap()
Change-Id: If2339aad0e0e825302773f2f04f0dd43cc754ac6
|
| | |\|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
b762ff3e4f am: 1a54e8f638
am: 78653b30e9
* commit '78653b30e9c1907d4c6eefa30ff954e0c4398447':
Fix aacDecoder_drcExtractAndMap()
Change-Id: I53cabb3bab17e8754a03648ffac356e4a3a05e28
|
| | |/|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
am: 1a54e8f638
* commit '1a54e8f6385f9cbb8d950f0ff003bb71daa62caf':
Fix aacDecoder_drcExtractAndMap()
Change-Id: I3c992ce7d3a60685f75a944d8d588fb9ff0d050c
|
| | |/|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
am: b762ff3e4f
* commit 'b762ff3e4fdc29ce517824e19d187ba667e80623':
Fix aacDecoder_drcExtractAndMap()
Change-Id: I29eaf51574e1834f223a9755a353abd90fcf912b
|
| | | |\
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
am: be3ff35425
* commit 'be3ff35425f026fb3714f1bd45c40aee6737fe05':
Fix aacDecoder_drcExtractAndMap()
Change-Id: I82060408eab9a8990c511af4c6be8a588d2a1b49
|
| | | |/|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
am: 97a1b8140d
* commit '97a1b8140d410ed3942006aa22b40ccb322f747b':
Fix aacDecoder_drcExtractAndMap()
Change-Id: I1bf523e635139d71ef124462bd61e0da06191d35
|
| | | |/
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Parse DVB DRC data only when numThreads is below
MAX_DRC_THREADS. The post-increment is necessary as
it is used in fill element DRC data section.
This solution parses as many DRC payloads as allowed by
MAX_DRC_THREADS and skips all remaining DRC elements in the stream.
Bug 27792766
Bug 26751339
Change-Id: Ie1641888bac1757c4d1491119f977fc5d436eaea
|
|\| | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
am: 47739cd
am: 118fc75
* commit '118fc75eee6cc763a3105d6e963b77d76d114a2e':
Fix stack corruption happening in aacDecoder_drcExtractAndMap()
|
| |\| |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
am: 47739cd
* commit '47739cd9d8d7842436b90ef14207c935b0a799fe':
Fix stack corruption happening in aacDecoder_drcExtractAndMap()
|
| | |\|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
am: a06d1c2
* commit 'a06d1c2b9af1621037b48557aac42b5ecbdb03b3':
Fix stack corruption happening in aacDecoder_drcExtractAndMap()
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
In the aacDecoder_drcExtractAndMap() function, self->numThreads
can be used after having exceeded its intended max value,
MAX_DRC_THREADS, causing memory to be cleared after the
threadBs[MAX_DRC_THREADS] array.
The crash is prevented by never using self->numThreads with
a value equal to or greater than MAX_DRC_THREADS.
A proper fix will be required as there seems to be an issue as
to which entry in the threadBs array is meant to be initialized
and used.
Bug 26751339
Change-Id: I655cc40c35d4206ab72e83b2bdb751be2fe52b5a
|
|/ / /
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Building __DATE__/__TIME__ into the binaries means that every build will
create different binaries, even if all the sources are identical. This
also means that any libraries including this one will need to be patched
during every OTA.
Nothing appears to use the build_date/build_time fields, so just replace
them with empty strings.
Bug: 24204119
Change-Id: I9543eb388a1e8ab9284df9035a62fc8942cdc082
(cherry picked from commit 6e8330732f61d1da1485fc07b61444f490d5e623)
|
|\| |
| | |
| | |
| | |
| | | |
* commit 'b3c5a4bb8442ab3158fa1f52b790fadc64546f46':
Fix crash on invalid channel config
|
| | |
| | |
| | |
| | |
| | | |
Bug: 23876444
Change-Id: I90ad197811ebabceb5b5d74d6d3f20716fbe2d45
|
|\ \ \
| | | |
| | | |
| | | | |
* commit 'f2df045ae92ee655481f73b19986084308ae684c':
|
| |\ \ \ |
|