![]() -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCWxWzwwAKCRDorT+BmrEO eEmGAJ9Y4YMBAgQmIsz5GjbvNk3Kqu3RGACdEcAsk2is8cSq1kKvF6Hmlappr3w= =pyl6 -----END PGP SIGNATURE----- gpgsig -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEJDfLduVEy2qz2d/TmXOSYMtstxYFAlsVt6IACgkQmXOSYMts txaWWg//bg+TS8zJixr4WwRjFL/eMLtLVKViMQX5p7ZEaaKZzzV178fG/yICUEGa TIDjR9RIFU2P17y7NJCN/Jwn3qSNgf1gxuSSUboNAPYUK3L9qFIGTmUZHGQ0nGMc q6eVO+leIF38+aePzD6utysAzrCO3rd7MKFyHaukQUVX0z46ObUZYUkNlxcalVfL /+8rzUOX5JnuD0iUaU1LwgxY/Kox2IDkmJCiI1mnexUGJ7fCDOZN5HLG+7bsRw2r +YiKzzOqsoAIiXNlZOL7K4fnB3kt0pslcsv4apt75547xqSl1guVM3qUOLhvgpKL yn2C0DLwi7QP5WOJjiyT7dNlmRBE1d5X/cWZZGffUbhMMcvFDxXO9yXmI9cS2nB9 2tfhlvEjf4COtmoai/5LwsyoLfJn+gtiAzQ2J7D+/FqMSYcF4p+cj0nKNNu5+aN7 od5RFOnodKIeGoGf6XJcPQtOZnCu+TpUe+xMaACTnolT/xHlcyCV5xCL+E6waNg5 0mGCOEOyXM3+LlFul8o++dd8UFDQr83Sq9VJ+S6flKIM/ShIle9bxvsO3TSu9Uy/ QlmP9/NBdnLmPqdabauq1HNINpQAFAnPFtP8MqHYGEdZczpAGf9ihJWFtAEPRWSw /KoFtUWCMsvFMnIz3EDAr2i3afb2/vE1seQc/X44uErwqsng8M8= =PN63 -----END PGP SIGNATURE----- Merge tag 'android-8.1.0_r0.62' into android-msm-bullhead-3.10 Android 8.1.0 Release 0.62 * tag 'android-8.1.0_r0.62': Revert "ion: ensure CMO target is valid" msm: ADSPRPC: Use ID in response to get context pointer qcacld-2.0: Fix potential buffer overwrite in the htt_t2h_lp_msg_handler qcacld-2.0: Add data_len check to avoid OOB access BACKPORT: ASN.1: fix out-of-bounds read when parsing indefinite length item UPSTREAM: KEYS: fix out-of-bounds read during ASN.1 parsing qcacld-2.0: Fix potential buffer overflow ion: ensure CMO target is valid crypto: hmac - require that the underlying hash algorithm is unkeyed qcacld-2.0: Move NBUF_UPDATE_TX_PKT_COUNT before freeing netbuf diag: dci: check signed values for negativity diag: Add conditional check for len in dci_process_ctrl_status() diag: Validate copying length against source buffer length mm-camera2:isp2: Handle use after free buffer ANDROID: Bluetooth: hidp: buffer overflow in hidp_process_report UPSTREAM: HID: Bluetooth: hidp: make sure input buffers are big enough qcacld-2.0: Remove FW memory dump feature BACKPORT: ipv6: fix udpv6 sendmsg crash caused by too small MTU UPSTREAM: ipv4, ipv6: ensure raw socket message is big enough to hold an IP header msm: ADSPRPC: use access_ok to validate pointers ASoC: wcd_cpe_core: Add mutex lock for CPE session Signed-off-by: Nathan Chancellor <natechancellor@gmail.com> |
||
---|---|---|
.. | ||
Kconfig | ||
Makefile | ||
core.c | ||
hidp.h | ||
sock.c |