Android Nougat AOSP Changes

Changes from 7.1.1_r39 (N4F27B) to 7.1.1_r40 (N6F27C):

Warning Releases with no significant changes other than version bump in platform/build component are likely to only feature proprietary binary blob (e.g. firmwares) changes.

Newly Added Components (0):

None

Removed Components (0):

None

Updated Components (42):

  • device/asus/fugu with 3 change(s)
    • a04581f : update media_codecs_performance.xml
    • 4a39caa : update media_codecs_performance.xml
    • e31f75d : dexpreopt: make significantly more room for l10n builds

  • device/asus/fugu-kernel with 2 change(s)
    • bbf3c5f : fugu: update prebuilt kernel
    • b9b7a0f : fugu: update prebuilt kernel

  • device/google/marlin with 2 change(s)
    • 475df60 : sepolicy: grant thermal-engine sys_boot
    • 3b48a49 : Add a thermal shutdown to marlin

  • device/htc/flounder with 1 change(s)
    • a37d1ee : Fix security issue in Visualizer effect

  • device/moto/shamu with 2 change(s)
    • 67b5be4 : Revert "Revert "Revert "Path fix for backend connection to FE upon call disconnection"""
    • 8e88ad7 : Revert "audio: fix headset + speaker path"

  • device/moto/shamu-kernel with 5 change(s)
    • 05ef9b9 : shamu: update prebuilt kernel
    • 49b50bd : shamu: update prebuilt kernel
    • 2b6acb2 : shamu: update prebuilt kernel
    • 0b3b978 : shamu: update prebuilt kernel
    • 8ae7c5f : shamu: update prebuilt kernel

  • platform/bionic with 1 change(s)
    • e046081 : Check for bad packets in getaddrinfo.c's getanswer.

  • platform/bootable/recovery with 1 change(s)
    • 2c6c23f : Add a checker for signature boundary in verifier

  • platform/build with 33 change(s)

  • platform/external/boringssl with 2 change(s)
    • 0ea0642 : Always use Fermat's Little Theorem in ecdsa_sign_setup.
    • 54bf62a : Rewrite BN_bn2dec.

  • platform/external/libavc with 24 change(s)
    • fc06de2 : Decoder: Fixed error handling for dangling fields
    • 33c58f0 : resolve merge conflicts of 3654ad0 to mnc-dr-dev
    • e3c28fd : Decoder: Fixed initialization of first_slice_in_pic
    • d7f020b : Decoder: Moved end of pic processing to end of decode call
    • f9152b9 : Decoder: Treat first slice in a picture as part of new picture always
    • 11d7e64 : Decoder: Return correct error code for slice header errors
    • c75d1a7 : Decoder: Initialize default reference buffers for all pictures
    • 7b7830a : Fix in returning end of bitstream error for MBAFF
    • 809dd02 : Decoder: Fixes an out of bound write in bitstream buffer
    • 6aac820 : Decoder: Padded gau1_ih264d_top_left_mb_part_indx_mod to avoid an out of bound read
    • 0a4463e : Decoder: Fix in checking first_mb_in_slice
    • 4a61d15 : Decoder: Increase memory allocation for weights & offsets for interlaced clips
    • 19814b7 : Decoder: Fixed DoS in header decode when no PPS is present
    • 0340381 : Decoder: Initialize ps_cur_slice-u1_mbaff_frame_flag correctly for error cases
    • 85c0ec4 : Decoder: Fixed an out of bound access while parsing SEI
    • 21851ea : Decoder: Fix in MB count in MBAff error handling
    • aa78b96 : Call ih264d_deblock_display only for valid process calls
    • ec9ab83 : Decoder: Fixed allocation of ps_dec-ps_nbr_mb_row
    • fd9a12f : Decoder: Fixed cur_mb_info initialization in error cases
    • a467b1f : Decoder: Fix in error concealment in the case of Mbaff clips
    • 0e8b1df : Decoder: Fix in the case of error in the first MB in frame.
    • c4f1525 : Decoder: Fix in returning incomplete frame error
    • 3695b6b : Decoder: Fix initialization of ps_next_dpb during reference list creation
    • cf606f3 : Decoder: Fix in checking for valid profile flags

  • platform/external/libgdx with 3 change(s)
    • eb13b1f : Security fix for overflow check.
    • fba04a5 : Fix buffer overflows
    • c156e72 : Fix security vulnerability

  • platform/external/libhevc with 10 change(s)
    • 32477b0 : Return error from cabac init if offset is greater than range
    • 8f01a47 : Handle error return from ref list in slice hdr parsing
    • b196ae3 : Return error if SPS parsing reads more bytes than the nal length
    • edbd2a6 : Handle invalid num_reorder_pics & max_dec_pic_buffering in SPS
    • d5736d9 : Fix in handling wrong cu_qp_delta
    • dfa7251 : Added check for invalid log2_max_transform_block_size in SPS
    • 3a64694 : Fixed handling invalid chroma tu size for error clips
    • f22345d : Fixed out of bound reads in stack variables
    • e20f6b8 : Fix in Chroma SAO for non-multiple of 8 height
    • b25d141 : Handle invalid slice_address in slice header

  • platform/external/libmpeg2 with 3 change(s)
    • 54a161c : Fix in handling header decode errors
    • 489ecbb : Check for Valid Frame Rate in Header
    • 47a5c8b : Error Check for VLD Symbols Read

  • platform/external/libnfc-nci with 1 change(s)
    • c67cc6a : Fix native crash in nfc_ncif_proc_activate

  • platform/external/libnl with 2 change(s)
    • ec857b5 : Perform range check on len in nlmsg_reserve
    • 77a7bed : libnl: Check data length in nla_reserve / nla_put

  • platform/external/libopus with 1 change(s)
    • 1ad8009 : Ensure that NLSF cannot be negative when computing a min distance between them

  • platform/external/libvpx with 2 change(s)
    • 6f5927d : libvpx: Cherry-pick 1961a92 from upstream
    • 145f317 : vp8:fix threading issues

  • platform/external/skia with 1 change(s)
    • df6e8ec : Fix out of bounds memory read in GIFMovie.cpp

  • platform/external/sonivox with 1 change(s)
    • 95e014e : eas_mdls: fix OOB read.

  • platform/external/tremolo with 1 change(s)
    • a4327f0 : Tremolo: fix ARM assembly code for decode_map type 3 case

  • platform/frameworks/av with 22 change(s)
    • 0be0ed5 : FLACExtractor: copy protect mWriteBuffer
    • f8fc1e8 : Add bounds check in SoftAACEncoder2::onQueueFilled()
    • ddc86fc : Fix NPDs in h263 decoder
    • 94a2371 : Fix out of bounds access
    • 76a66d3 : Fix integer overflow and divide-by-zero
    • 1552726 : Validate lengths in HEVC metadata parsing
    • bb1408b : codecs: handle onReset() for a few encoders
    • 51e7260 : AudioFlinger: Check framecount overflow when creating track
    • b39ad06 : resolve merge conflicts of 79cf158c51 to mnc-dev
    • 2395604 : EffectBundle: check nb channels to write speaker angles
    • d9bfa1e : Fix overflow check and check read result
    • f0ce53d : CameraBase: Don't return an sp by reference
    • 5cabe32 : avc_utils: skip empty NALs from malformed bistreams
    • bc62c08 : Don't initialize sync sample parameters until the end
    • 048ba59 : Fix security vulnerability: potential OOB write in audioserver
    • bab10e4 : Effect: Use local cached data for Effect commit
    • e684672 : Fix security vulnerability: Effect command might allow negative indexes
    • 4adf91c : Make VBRISeeker more robust
    • 70b95dd : Effects: Check get parameter command size
    • adb8603 : Fix security vulnerability: Equalizer command might allow negative indexes
    • a09eaa0 : stagefright: remove allottedSize equality check in IOMX::useBuffer
    • 0e1e9f4 : Visualizer: Check capture size and latency parameters

  • platform/frameworks/base with 26 change(s)
    • 6e5b745 : Fix issue with saving admins before finishing loading.
    • aeefec3 : resolve merge conflicts of ad4aa1ce7d3d to nyc-mr1-dev fix conflict in nyc-mr2-release Change-Id: I97ef31536cd06495a08a3f94f81df2d1376186e0
    • e17be37 : Protect Bluetooth OPP ACCEPT and DECLINE broadcast fix merge conflict into nyc-mr1-release branches Non-system apps could send these, and accept OPP transfers without user interaction.
    • b406288 : Do not write if apply() did not change the file.
    • e346265 : Only persist last Shared Preferences state
    • 164437c : Fixed the logic for tethering provisioning re-evaluation
    • 7261a92 : Fix issue with saving admins before finishing loading.
    • 618391b : resolve merge conflicts of ad4aa1ce7d3d to nyc-mr1-dev
    • d22261f : Fix exploit where can hide the fact that a location was mocked am: a206a0f17e am: d417e54872 am: 3380a77516 am: 0a8978f04b am: 1684e5f344 am: d28eef0cc2 am: 1f458fdc66 am: d82f8a67fc am: 1ac8affd51 am: 56098f81b6 am: 7cec76de0f am: 2da05d0f9e
    • 5f621b5 : Add @GuardedBy annotation to PersistentDataBlockService#mIsWritable.
    • 1c4d535 : Prevent writing to FRP partition during factory reset.
    • de5747d : Fix vulnerability in MemoryIntArray
    • faf904b : Zygote : Block SIGCHLD during fork.
    • c4b8272 : Fix idmap leak in zygote process
    • 7f0c2c8 : Zygote: Additional whitelisting for legacy devices.
    • f522425 : Zygote: Additional whitelists for runtime overlay / other static resources.
    • def0efd : Public volumes belong to a single user.
    • 25ddf85 : Add SafetyNet logging to DHCP packet parsing
    • ec129c3 : Reject DHCP packets with no magic cookie
    • c28117b : Catch runtime exceptions when parsing DHCP packets
    • ad760e1 : Fix boot loop when upgrading direclty from L to N
    • 3570784 : Revert "Catch KeyStoreException for setting profile lock"
    • 867ef61 : Catch KeyStoreException for setting profile lock
    • 0804215 : Fixed a bug with the emergency affordance in multi user
    • 84e380e : Catch KeyStoreException for setting profile lock
    • aca11d8 : Fixed a bug with the emergency affordance in multi user

  • platform/frameworks/ex with 2 change(s)
    • 7c824f1 : resolve merge conflicts of 89cdd4cb to mnc-dev
    • 30ee0df : resolve merge conflicts of 3802db4 to mnc-dev

  • platform/frameworks/native with 6 change(s)
    • e3fd69c : Fix security vulnerability
    • 541b1eb : Correct overflow check in Parcel resize code
    • 74dae33 : Fix security vulneratibly 31960359
    • 509fb5c : Fix SF security vulnerability: 32706020
    • 38ac668 : Fix SF security vulnerability: 32660278
    • 9a8df9a : Fix integer overflow in unsafeReadTypedVector

  • platform/frameworks/opt/net/wifi with 1 change(s)
    • 41c42f5 : configparse: do not delete passpoint configuration file

  • platform/hardware/broadcom/wlan with 1 change(s)
    • a81c7ef : net: wireless: bcmdhd: update bcm4354/56 FW (7.35.101.5)

  • platform/hardware/libhardware with 1 change(s)
    • 9f0e940 : Fix security vulnerability: potential OOB write in audioserver

  • platform/hardware/qcom/audio with 2 change(s)
    • 7e12c89 : Fix security vulnerability: Effect command might allow negative indexes
    • a0bfcdb : Fix security vulnerability: Equalizer command might allow negative indexes

  • platform/libcore with 3 change(s)
    • c82a939 : Fix URLTest#testAtSignInUserInfo failure
    • 54c9bd5 : Pull upstream fix for CVE-2016-5552
    • c55ce33 : Fix URL parser may return wrong host name

  • platform/packages/apps/Bluetooth with 1 change(s)
    • 379e7b6 : Remove MANAGE_DOCUMENTS permission as it isn't needed

  • platform/packages/apps/CertInstaller with 2 change(s)
    • 1ad3b1e : WifiInstaller: add permission for access downloaded files
    • 1166ca8 : WifiInstaller: remove the installation file

  • platform/packages/apps/ContactsCommon with 1 change(s)
    • 80822d7 : resolve merge conflicts of 9f523b4 to nyc-dev

  • platform/packages/apps/Messaging with 5 change(s)
    • 3f98211 : 32764144 Security Vulnerability - heap buffer overflow in libgiftranscode.so in colorMap-Colors[colorIndex]
    • 8ba22b4 : 33388925 Mismatched new vs delete in framesequence library
    • 1bb11f3 : resolve merge conflicts of eafd58a to nyc-dev
    • 13f739b : 32807795 Security Vulnerability - AOSP Messaging App: thirdparty can attach private files from "/data/data/com.android.messaging/" directory to the messaging app.
    • 86e5bf5 : 32322450 Security Vulnerability - heap buffer overflow in libgiftranscode.so

  • platform/packages/apps/PackageInstaller with 1 change(s)
    • 5c49b6b : Prioritize package installer intent filter

  • platform/packages/apps/Settings with 1 change(s)
    • e41ac81 : Ignore orientation change to preserve ApnEditor.

  • platform/packages/apps/TvSettings with 2 change(s)
    • 7ef9b3a : Provide stub intent filters for CTS
    • abc1728 : Provide stub intent filters for CTS

  • platform/packages/apps/UnifiedEmail with 1 change(s)
    • 1fc7b01 : Don't allow file attachment from /data through GET_CONTENT.

  • platform/packages/services/Telephony with 3 change(s)
    • c88b976 : Added permission check for setCellInfoListRate
    • 38b45bb : Catch SIP exceptions which can crash Phone process on answer.
    • c8f5e04 : Not cache empty config bundle.

  • platform/system/bt with 3 change(s)
    • 1c6662b : resolve merge conflicts of a3ee2e35 to nyc-dev
    • 2675836 : Remove position dependent lookup tables in AT command parser
    • b90b669 : Mask out HFP 1.7 feature bits if peer version is 1.7

  • platform/system/core with 1 change(s)
    • 7f94bb4 : change /data/bugreports to /bugreports

  • platform/system/sepolicy with 1 change(s)