diff options
author | Siyuan Zhou <siyuanzhou@google.com> | 2018-03-14 14:58:56 -0700 |
---|---|---|
committer | android-build-team Robot <android-build-team-robot@google.com> | 2018-03-15 18:33:14 +0000 |
commit | dc0f7d192fcc1bbab4153fee7f5aa1e4353ebfcc (patch) | |
tree | 2faeddec1e38fe9a6342a4129f8e78e38c5ad408 | |
parent | 9bf45450ce3c21bd289eba8ac9897606d3d04cac (diff) | |
download | bullhead-kernel-dc0f7d192fcc1bbab4153fee7f5aa1e4353ebfcc.tar.gz |
bullhead: update kernel prebuilt
d5f156e7 Merge branch 'android-msm-bullhead-3.10-security-next' into android-msm-bullhead-3.10
76be9810 nl80211: Define policy for packet pattern attributes
bfa5b61b msm: rmnet_ipa: fix memory overflow issue
dfd0459c qcacld-2.0: Add sanity check for vdev_id in wma_wow_wakeup_host_event
3a571e09 qcacld-2.0: Add sanity check for vdev id to prevent OOB access
e2a8ef49 qcacld-2.0: Calculate buf_len properly for extscan hotlist event buffer
5d25d8a2 qcacld-2.0: Validate packet length, before processing PTT commands
a63aac90 msm: ipa3: add lock for num_q6_rule
891c90f0 BACKPORT: USB: core: harden cdc_parse_cdc_header
c9bd2cd9 UPSTREAM: KEYS: encrypted: fix buffer overread in valid_master_desc()
9dc7a159 BACKPORT: net: ipv4: fix for a race condition in raw_sendmsg
cd7093ed qcacld-2.0: Fix Integer overflow in wma_tbttoffset_update_event_handler()
c6b6e21f qcacld-2.0: Fix buffer overwrite in wma_extscan_rsp_handler
528712e7 qcacld-2.0: Fix buffer overwrite in wma_sap_ofl_add_sta_handler
34a2619b qcacld-2.0: Check for valid vdev ID in SWBA event handler
f6214fdc ASoC: apr: Add validity check to APR port
85d269c7 msm: ipa: Fix the handling of default IPA header
f06ca6bb qcacld-2.0: Fix buffer overread in wma_extscan_hotlist_match_event_handler
e6f38cf1 qcacld-2.0: Fix buffer overrun in function ProcSetReqInternal
9b9ceab4 qcacld-2.0: Fix potential buffer overflow in htt_t2h_lp_msg_handler
9ae8fd63 qcacld-2.0: Fix potential buffer overflow in ol_rx_flush_handler
cabd0479 qcacld-2.0: Fix potential buffer overflow in process_tx_info
a27f289f Merge branch 'android-msm-bullhead-3.10' into android-msm-bullhead-3.10-security-next
Linux version 3.10.73-gd5f156e7af96 (android-
build@xpcc4.ams.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Wed Mar 14 20:58:58
UTC 2018
Bug: 33967002
Bug: 64403015
Bug: 65853393
Bug: 68992477
Bug: 69052594
Bug: 70526974
Bug: 71500434
Bug: 71501686
Bug: 71501687
Bug: 71501691
Bug: 71501692
Bug: 71501694
Bug: 71501695
Bug: 72956842
Bug: 72956920
Bug: 72956997
Bug: 72957136
Bug: 72957177
Bug: 72957235
Bug: 72957269
Bug: 73499097
Bug: 74613955
Change-Id: If49df4fb6543d3bc0b5ed7ac8d83522faf0f036e
Source-Branch: android-msm-bullhead-3.10
Signed-off-by: Siyuan Zhou <siyuanzhou@google.com>
(cherry picked from commit 5ce36521755652cb2622340861c8df62b2aed9d3)
-rw-r--r-- | Image.gz-dtb | bin | 10829785 -> 10831762 bytes |
1 files changed, 0 insertions, 0 deletions
diff --git a/Image.gz-dtb b/Image.gz-dtb Binary files differindex 01db8d2..1543059 100644 --- a/Image.gz-dtb +++ b/Image.gz-dtb |