Android Nougat AOSP Changes

Changes from 7.1.1_r48 (N6F27I) to 7.1.1_r49 (N9F27H):

Warning Releases with no significant changes other than version bump in platform/build component are likely to only feature proprietary binary blob (e.g. firmwares) changes.

Newly Added Components (0):

None

Removed Components (0):

None

Updated Components (38):

  • device/htc/flounder with 2 change(s)
    • 2275ae3 : ARM: tegra: flounder: update lates gps HAL 65.19.20.279807_47521
    • 8c6d352 : Fix security issue in Visualizer effect

  • device/htc/flounder-kernel with 3 change(s)
    • bd895d3 : flounder: update kernel prebuild (Jul 2017 NYC-MR1 Security)
    • fb053e6 : Revert "flounder: update kernel prebuild (Jan 2017 NYC-MR1 Security)"
    • d6defca : flounder: update kernel prebuild (Jan 2017 NYC-MR1 Security)

  • platform/bionic with 2 change(s)
    • 9267178 : linker: remove link from external library on unload
    • af2b89d : Check for bad packets in getaddrinfo.c's getanswer.

  • platform/bootable/recovery with 1 change(s)
    • 8c51563 : Add a checker for signature boundary in verifier

  • platform/build with 40 change(s)

  • platform/external/boringssl with 3 change(s)
    • 18cd5ad : CVE 2016-2109 fix
    • c82cdce : Always use Fermat's Little Theorem in ecdsa_sign_setup.
    • 389f3a6 : Rewrite BN_bn2dec.

  • platform/external/dng_sdk with 1 change(s)
    • 4f72651 : Throw exception on integer overflow in dng_ifd.cpp.

  • platform/external/libavc with 40 change(s)
    • b84ffbf : Fixed hang in the case of multiple sps id.
    • e5702dc : Decoder: Fix in the case of MMCO 6
    • d654cd9 : Decoder: Cleaned up parse sps function.
    • f79bff9 : Initializing reference list for every P/B slice.
    • 26a401c : Fix resolution change within a decode call.
    • 790eb88 : Decoder: Fixed allocation size of pred info buffer
    • 87d8871 : Decoder: Fix end of bitstream error.
    • 009d5e1 : Decoder: Fix allocation for Mbaff weight matrix
    • 7fd046a : Decoder: Initialize MB info buffer to zero.
    • 0fc4db6 : Decoder: Fixed flag u1_top_bottom_decoded.
    • e64b0c9 : Decoder: Added an error check while parsing PPS.
    • 6cfc251 : Fix stack buffer overflow in ih264d_process_intra_mb
    • 1321521 : Decoder: Fix in reference list initialization.
    • 0bcfdeb : Decoder: Fixes in accessing mbaff flag in error cases
    • cf16964 : Fix in the case of MMCO 3 (long term reference idx).
    • 059b9e7 : Decoder: Fixed number of MB calculation for interlaced error streams
    • e06af0c : Decoder: Fixed error handling for dangling fields
    • ebfae1e : resolve merge conflicts of 3654ad0 to mnc-dr-dev
    • 70377a7 : Decoder: Fixed initialization of first_slice_in_pic
    • 20406fd : Decoder: Moved end of pic processing to end of decode call
    • 1a151ba : Decoder: Treat first slice in a picture as part of new picture always
    • 5b1e606 : Decoder: Return correct error code for slice header errors
    • fdf4e0f : Decoder: Initialize default reference buffers for all pictures
    • f924833 : Fix in returning end of bitstream error for MBAFF
    • 79e21c8 : Decoder: Fixes an out of bound write in bitstream buffer
    • 2941056 : Decoder: Padded gau1_ih264d_top_left_mb_part_indx_mod to avoid an out of bound read
    • 4b34816 : Decoder: Fix in checking first_mb_in_slice
    • 057906a : Decoder: Increase memory allocation for weights & offsets for interlaced clips
    • 588ae7f : Decoder: Fixed DoS in header decode when no PPS is present
    • 686d1fb : Decoder: Initialize ps_cur_slice-u1_mbaff_frame_flag correctly for error cases
    • 28d6ac6 : Decoder: Fixed an out of bound access while parsing SEI
    • e077964 : Decoder: Fix in MB count in MBAff error handling
    • 66edaca : Call ih264d_deblock_display only for valid process calls
    • 5631b39 : Decoder: Fixed allocation of ps_dec-ps_nbr_mb_row
    • 8acbacd : Decoder: Fixed cur_mb_info initialization in error cases
    • f39228a : Decoder: Fix in error concealment in the case of Mbaff clips
    • 0030772 : Decoder: Fix in the case of error in the first MB in frame.
    • 015fca4 : Decoder: Fix in returning incomplete frame error
    • c8e5ad3 : Decoder: Fix initialization of ps_next_dpb during reference list creation
    • 6403745 : Decoder: Fix in checking for valid profile flags

  • platform/external/libgdx with 8 change(s)
    • ca415ad : Fix 36385715 heap overflow when loading HDR files
    • 120f757 : Fix Pixmap overflow. Bug 36621442
    • 7eb9e51 : Fix series of JPEG vulnerabilities
    • 673db8a : Fix 36385715 heap overflow when loading HDR files
    • 16e447a : Fix heap overflow when loading a PSD. bug 36368305
    • e86eedd : Security fix for overflow check.
    • baea103 : Fix buffer overflows
    • f10419e : Fix security vulnerability

  • platform/external/libhevc with 21 change(s)
    • 1812bc2 : Fix OOB issue in nal unit parsing
    • 3fc6211 : Set pic_present at end of pic_init instead of beginning
    • 3fa3512 : Handle error return in parse slice
    • 719b550 : Fix heap buffer overflow while searching for valid PPS
    • 66cf0f2 : Check for buffer overflow in pps/slice header parsing
    • 8202ba8 : memset SPS to zero
    • 3df93dd : Fix reallocation for new sps
    • 2798cd4 : Check for cpb cnt in hrd parsing
    • 86cdfd6 : Correct Tiles rows and cols check
    • 6754d3e : Set current slice ctb x and y to fill prev incomplete slice
    • e31ce92 : Check only allocated mv bufs for releasing from reference
    • 0133b2f : Return error from cabac init if offset is greater than range
    • 3bc0f91 : Handle error return from ref list in slice hdr parsing
    • a8c54cf : Return error if SPS parsing reads more bytes than the nal length
    • cbeaf95 : Handle invalid num_reorder_pics & max_dec_pic_buffering in SPS
    • b06fcff : Fix in handling wrong cu_qp_delta
    • 4632037 : Added check for invalid log2_max_transform_block_size in SPS
    • d6e122d : Fixed handling invalid chroma tu size for error clips
    • 2ebdc02 : Fixed out of bound reads in stack variables
    • 8e3e5b1 : Fix in Chroma SAO for non-multiple of 8 height
    • a15d536 : Handle invalid slice_address in slice header

  • platform/external/libmpeg2 with 10 change(s)
    • 9cbe47f : Correcting NumCoeff Check in VLD
    • bf98dfe : Adding Error Check For PictureStructure Param
    • 7260102 : Update mbs_left In Case Of Missing Slice
    • 8928a1e : Check For Zero Width/Height in Frame Header
    • d2db891 : Check Number of Skip MBs
    • 1392c07 : Error Resilience - Check on as_recent_fld[0][1]
    • 3af1cc8 : Fix Bytes Consumed Issue
    • 052cc94 : Fix in handling header decode errors
    • 8d49341 : Check for Valid Frame Rate in Header
    • 01f3db4 : Error Check for VLD Symbols Read

  • platform/external/libnfc-nci with 1 change(s)
    • 3e3d4ce : Fix native crash in nfc_ncif_proc_activate

  • platform/external/libnl with 2 change(s)
    • 07561d9 : Perform range check on len in nlmsg_reserve
    • 7dd2dbd : libnl: Check data length in nla_reserve / nla_put

  • platform/external/libopus with 1 change(s)
    • 9eff1d5 : Ensure that NLSF cannot be negative when computing a min distance between them

  • platform/external/libvpx with 3 change(s)
    • 3c47451 : Limit vpx decoder to 4K frames
    • e7da1ed : libvpx: Cherry-pick 1961a92 from upstream
    • 0603d0c : vp8:fix threading issues

  • platform/external/skia with 1 change(s)
    • 440638d : Fix out of bounds memory read in GIFMovie.cpp

  • platform/external/sonivox with 3 change(s)

  • platform/external/tremolo with 2 change(s)
    • 06e6c39 : Always use unsigned char
    • b61055f : Tremolo: fix ARM assembly code for decode_map type 3 case

  • platform/frameworks/av with 35 change(s)
    • 973fb33 : Fix security vulnerability: Equalizer setParameter memory overflow
    • df97987 : RESTRICT AUTOMERGE Check the buffer index from acquireBuffer
    • e60444a : better manage buffer for libstagefright_soft_mpeg4enc
    • 8134630 : m4v_h263: update width/height only when they are valid.
    • 04d60f2 : m4v_h263: check header first before decoding a frame.
    • 9d8247f : Fix integer overflow in mediadrmserver
    • 19724bd : Fix potential leak
    • a520c5d : Modifying MetaData invalidates previous char*
    • 4cd260f : Fix memory leak in error case
    • 4efebc8 : Limit ogg packet size
    • 5eb118f : Prevent OOB write in soft_avc encoder
    • 0795422 : Don't allow using or allocating a buffer after the first state transition
    • 9e11500 : Avoid crash for stss sync sample number 0
    • e707523 : FLACExtractor: copy protect mWriteBuffer
    • a03bccc : Add bounds check in SoftAACEncoder2::onQueueFilled()
    • 23a4e08 : Fix NPDs in h263 decoder
    • 4e85c47 : Fix out of bounds access
    • 5e7096d : Fix integer overflow and divide-by-zero
    • c95878a : Validate lengths in HEVC metadata parsing
    • d370c15 : codecs: handle onReset() for a few encoders
    • 28f25f1 : AudioFlinger: Check framecount overflow when creating track
    • 70debbc : resolve merge conflicts of 79cf158c51 to mnc-dev
    • 2f78c70 : EffectBundle: check nb channels to write speaker angles
    • 3247c85 : Fix overflow check and check read result
    • cb15fe4 : CameraBase: Don't return an sp by reference
    • 5109209 : avc_utils: skip empty NALs from malformed bistreams
    • 976f76a : Don't initialize sync sample parameters until the end
    • 0eae364 : Fix security vulnerability: potential OOB write in audioserver
    • ee169b8 : Effect: Use local cached data for Effect commit
    • 20cd1ea : Fix security vulnerability: Effect command might allow negative indexes
    • 16e7fa2 : Make VBRISeeker more robust
    • a1712f7 : Effects: Check get parameter command size
    • b57c79b : Fix security vulnerability: Equalizer command might allow negative indexes
    • 12ac1ae : stagefright: remove allottedSize equality check in IOMX::useBuffer
    • 6e6e992 : Visualizer: Check capture size and latency parameters

  • platform/frameworks/base with 22 change(s)
    • 20ca6f0 : Close connection before retrying
    • be40c36 : ZygoteInit: Remove CAP_SYS_RESOURCE
    • 254ac98 : system_server: add CAP_SYS_PTRACE
    • 3c52289 : Make a11y node info parceling more robust
    • be847ca : Fix issue with saving admins before finishing loading.
    • 730cf1b : resolve merge conflicts of ad4aa1ce7d3d to nyc-mr1-dev fix conflict in nyc-mr2-release Change-Id: I97ef31536cd06495a08a3f94f81df2d1376186e0
    • c0748ad : Protect Bluetooth OPP ACCEPT and DECLINE broadcast fix merge conflict into nyc-mr1-release branches Non-system apps could send these, and accept OPP transfers without user interaction.
    • 619294b : Fixed the logic for tethering provisioning re-evaluation
    • 0aa690c : Fix exploit where can hide the fact that a location was mocked am: a206a0f17e am: d417e54872 am: 3380a77516 am: 0a8978f04b am: 1684e5f344 am: d28eef0cc2 am: 1f458fdc66 am: d82f8a67fc am: 1ac8affd51 am: 56098f81b6 am: 7cec76de0f am: 2da05d0f9e
    • 516878f : Fix issue with saving admins before finishing loading.
    • 3dc78b6 : resolve merge conflicts of ad4aa1ce7d3d to nyc-mr1-dev
    • 1408ffa : Add @GuardedBy annotation to PersistentDataBlockService#mIsWritable.
    • 6a6fe03 : Prevent writing to FRP partition during factory reset.
    • a683cda : Fix vulnerability in MemoryIntArray
    • badbe4e : Zygote : Block SIGCHLD during fork.
    • 79a52bb : Fix idmap leak in zygote process
    • 9b2c33c : Zygote: Additional whitelisting for legacy devices.
    • 2b074fa : Zygote: Additional whitelists for runtime overlay / other static resources.
    • d9f38b1 : Public volumes belong to a single user.
    • 20626d4 : Add SafetyNet logging to DHCP packet parsing
    • ec7bb1d : Reject DHCP packets with no magic cookie
    • 1af48bb : Catch runtime exceptions when parsing DHCP packets

  • platform/frameworks/ex with 2 change(s)
    • 3f8da55 : resolve merge conflicts of 89cdd4cb to mnc-dev
    • 854f11a : resolve merge conflicts of 3802db4 to mnc-dev

  • platform/frameworks/native with 10 change(s)
    • f233677 : fix race condition that can cause a use after free
    • 9ef1d1a : libgui: check for invalid slot in attachBuffer
    • a5b8d8c : libgui: Check slot received from IGBP in Surface
    • 18e80ba : ui: Fix bad size check in Fence::unflatten
    • 198090d : Fix security vulnerability
    • 079e79c : Fix security vulneratibly 31960359
    • dc6d25f : Fix SF security vulnerability: 32706020
    • 65dd433 : Correct overflow check in Parcel resize code
    • cb7eff6 : Fix SF security vulnerability: 32660278
    • 8163b88 : Fix integer overflow in unsafeReadTypedVector

  • platform/frameworks/opt/net/wifi with 2 change(s)
    • f7e7a5c : cherry-pick: wifinative jni: check array length for trackSignificantWifiChange
    • dceb463 : configparse: do not delete passpoint configuration file

  • platform/hardware/broadcom/wlan with 3 change(s)
    • f56a465 : net: wireless: bcmdhd: update bcm4354/56 FW (7.35.101.6)
    • 2fad935 : net: wireless: bcmdhd: adding bssid count NL attribute in SWC config
    • c60518d : net: wireless: bcmdhd: update bcm4354/56 FW (7.35.101.5)

  • platform/hardware/libhardware with 1 change(s)
    • 63c974b : Fix security vulnerability: potential OOB write in audioserver

  • platform/hardware/qcom/audio with 3 change(s)
    • 4ac551f : Fix security vulnerability: Equalizer setParameter memory overflow
    • 51e4565 : Fix security vulnerability: Effect command might allow negative indexes
    • 74f4b13 : Fix security vulnerability: Equalizer command might allow negative indexes

  • platform/libcore with 5 change(s)
    • 63b48fb : Proper fix for rejecting ftp URL with /r/n.
    • a28d580 : Test for rejection of ftp URL with /r/n in userinfo
    • bbcb2cc : Fix URLTest#testAtSignInUserInfo failure
    • 41e7822 : Pull upstream fix for CVE-2016-5552
    • dae6afd : Fix URL parser may return wrong host name

  • platform/packages/apps/Bluetooth with 3 change(s)
    • 2f78e06 : Prevent OPP from opening files that aren't sent over Bluetooth
    • 86bcc94 : OPP: Restrict file based URI access to external storage
    • 22d032f : Remove MANAGE_DOCUMENTS permission as it isn't needed

  • platform/packages/apps/CertInstaller with 2 change(s)
    • 0c3623d : WifiInstaller: add permission for access downloaded files
    • 66c86a6 : WifiInstaller: remove the installation file

  • platform/packages/apps/ContactsCommon with 1 change(s)
    • bb07eb5 : resolve merge conflicts of 9f523b4 to nyc-dev

  • platform/packages/apps/Messaging with 5 change(s)
    • b2d8d72 : 32764144 Security Vulnerability - heap buffer overflow in libgiftranscode.so in colorMap-Colors[colorIndex]
    • ef5244a : 33388925 Mismatched new vs delete in framesequence library
    • 1da8691 : resolve merge conflicts of eafd58a to nyc-dev
    • d599d42 : 32807795 Security Vulnerability - AOSP Messaging App: thirdparty can attach private files from "/data/data/com.android.messaging/" directory to the messaging app.
    • a60fa15 : 32322450 Security Vulnerability - heap buffer overflow in libgiftranscode.so

  • platform/packages/apps/PackageInstaller with 1 change(s)
    • 18936da : Prioritize package installer intent filter

  • platform/packages/apps/Settings with 2 change(s)
    • fdf33d9 : Fix phishing attack in ChooseLockGeneric
    • e9712de : resolve merge conflicts of 3964c51bf2 to nyc-dev

  • platform/packages/apps/UnifiedEmail with 1 change(s)
    • 0797acb : Don't allow file attachment from /data through GET_CONTENT.

  • platform/packages/services/Telephony with 2 change(s)
    • ad7643c : Added permission check for setCellInfoListRate
    • dda466a : Catch SIP exceptions which can crash Phone process on answer.

  • platform/system/bt with 2 change(s)
    • bf40893 : Check LE advertising data length before caching advertising records
    • c40d71a : resolve merge conflicts of a3ee2e35 to nyc-dev

  • platform/system/core with 2 change(s)
    • 2aca93e : Fix out of bound read in libziparchive
    • cd77f5e : change /data/bugreports to /bugreports

  • platform/system/sepolicy with 2 change(s)
    • 94488ea : system_server: replace sys_resource with sys_ptrace
    • 1d145be : label /bugreports