<feed xmlns='http://www.w3.org/2005/Atom'>
<title>platform_external_libxaac, branch pie-b4s4-dev</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_libxaac/'/>
<entry>
<title>Merge "Fix for crash in ixheaacd_esbr_synthesis_regrp" into pi-dev</title>
<updated>2019-01-03T03:26:10+00:00</updated>
<author>
<name>Ray Essick</name>
<email>essick@google.com</email>
</author>
<published>2019-01-03T03:26:10+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_libxaac/commit/?id=c9062c1c4de3d6f0177cf9ea02431f766db42ae7'/>
<id>c9062c1c4de3d6f0177cf9ea02431f766db42ae7</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge "Fix for oobw in impd_parse_drc_instructions_uni_drc()" into pi-dev</title>
<updated>2019-01-03T03:23:27+00:00</updated>
<author>
<name>Ray Essick</name>
<email>essick@google.com</email>
</author>
<published>2019-01-03T03:23:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_libxaac/commit/?id=e0c41aae881685701b6c63aae86d09683f57aae8'/>
<id>e0c41aae881685701b6c63aae86d09683f57aae8</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge "Fix for crash due to negative size passed to memcpy" into pi-dev</title>
<updated>2019-01-02T22:10:34+00:00</updated>
<author>
<name>TreeHugger Robot</name>
<email>treehugger-gerrit@google.com</email>
</author>
<published>2019-01-02T22:10:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_libxaac/commit/?id=a9f6ff8cccf8fac32345b6bddee8180eafd6b55e'/>
<id>a9f6ff8cccf8fac32345b6bddee8180eafd6b55e</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge "Fix for oobw in impd_dec_slopes in DRC dynamic payload" into pi-dev</title>
<updated>2019-01-02T19:38:40+00:00</updated>
<author>
<name>Ray Essick</name>
<email>essick@google.com</email>
</author>
<published>2019-01-02T19:38:40+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_libxaac/commit/?id=622f7249110df350852726a6be078c7b58004901'/>
<id>622f7249110df350852726a6be078c7b58004901</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix for oobw in impd_parse_drc_instructions_uni_drc()</title>
<updated>2018-12-21T18:59:49+00:00</updated>
<author>
<name>Ramesh Katuri</name>
<email>ramesh.katuri@ittiam.com</email>
</author>
<published>2018-11-17T09:22:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_libxaac/commit/?id=ed831abc6524db9855e4f55454d0fcdf13e9d0ce'/>
<id>ed831abc6524db9855e4f55454d0fcdf13e9d0ce</id>
<content type='text'>
gain_set_index_for_channel_group[] is any array of size
CHANNEL_GROUP_COUNT_MAX i.e 24. This array is accessed using
str_drc_instruction_str-&gt;num_drc_ch_groups as index, whose
value can be more than 24.

Bound check is added for str_drc_instruction_str-&gt;num_drc_ch_groups
before accessing gain_set_index_for_channel_group[]

Bug:117832864
Test: vendor
Change-Id: I3799c2de6926f1193a5e0193bc3b5863c478d4ab
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
gain_set_index_for_channel_group[] is any array of size
CHANNEL_GROUP_COUNT_MAX i.e 24. This array is accessed using
str_drc_instruction_str-&gt;num_drc_ch_groups as index, whose
value can be more than 24.

Bound check is added for str_drc_instruction_str-&gt;num_drc_ch_groups
before accessing gain_set_index_for_channel_group[]

Bug:117832864
Test: vendor
Change-Id: I3799c2de6926f1193a5e0193bc3b5863c478d4ab
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix for oobw in impd_dec_slopes in DRC dynamic payload</title>
<updated>2018-12-21T18:43:09+00:00</updated>
<author>
<name>Ramesh Katuri</name>
<email>ramesh.katuri@ittiam.com</email>
</author>
<published>2018-10-31T10:40:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_libxaac/commit/?id=56a2e1e9c6a7e66777d060d424413580e0d85c67'/>
<id>56a2e1e9c6a7e66777d060d424413580e0d85c67</id>
<content type='text'>
Bug:118143575
Test: vendor
Change-Id: I35940099dc804a96a5790bf8e8b29df049838a17
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Bug:118143575
Test: vendor
Change-Id: I35940099dc804a96a5790bf8e8b29df049838a17
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix for stack buffer overflow in ixheaacd_latm_stream_mux_config</title>
<updated>2018-12-21T18:27:29+00:00</updated>
<author>
<name>Ramesh Katuri</name>
<email>ramesh.katuri@ittiam.com</email>
</author>
<published>2018-10-30T09:05:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_libxaac/commit/?id=2e513342a16db22998a52085b8c3b0b01a462f02'/>
<id>2e513342a16db22998a52085b8c3b0b01a462f02</id>
<content type='text'>
Bug:118149009
Test: vendor
Change-Id: I16213a2db36e9d678f7105edda9a4a6c17a3f8a6
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Bug:118149009
Test: vendor
Change-Id: I16213a2db36e9d678f7105edda9a4a6c17a3f8a6
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix for crash in ixheaacd_esbr_synthesis_regrp</title>
<updated>2018-12-21T17:30:36+00:00</updated>
<author>
<name>Ramesh Katuri</name>
<email>ramesh.katuri@ittiam.com</email>
</author>
<published>2018-10-31T10:20:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_libxaac/commit/?id=b0c549e5d8b348697cd25a3135cf7c95b98717e3'/>
<id>b0c549e5d8b348697cd25a3135cf7c95b98717e3</id>
<content type='text'>
Inside ia_sbr_frame_info_data_struct, limit table is defined as WORD32 lim_table[4][12 + 1];
lim_table is accessed using gate_mode which is defined as WORD32 gate_mode[4];
For all these below issues one of the value of gate_mode is greater than 12, when lim_table
is accessed with more than 12 we are getting some garbage value which is causing pointer
corruption for b/118386824, Heap buffer overflow for b/118389774 and stack buffer overflow
for b/118494588.

As a fix we are returning fatal error if value in gate_mode &gt; 12

Bug:118386824
Bug:118389774
Bug:118494588
Test: vendor
Change-Id: I713c5438f56a13f06f0f76ed22ad96ff667741a4
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Inside ia_sbr_frame_info_data_struct, limit table is defined as WORD32 lim_table[4][12 + 1];
lim_table is accessed using gate_mode which is defined as WORD32 gate_mode[4];
For all these below issues one of the value of gate_mode is greater than 12, when lim_table
is accessed with more than 12 we are getting some garbage value which is causing pointer
corruption for b/118386824, Heap buffer overflow for b/118389774 and stack buffer overflow
for b/118494588.

As a fix we are returning fatal error if value in gate_mode &gt; 12

Bug:118386824
Bug:118389774
Bug:118494588
Test: vendor
Change-Id: I713c5438f56a13f06f0f76ed22ad96ff667741a4
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix for crash due to negative size passed to memcpy</title>
<updated>2018-11-29T20:14:59+00:00</updated>
<author>
<name>Ramesh Katuri</name>
<email>ramesh.katuri@ittiam.com</email>
</author>
<published>2018-11-21T11:26:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_libxaac/commit/?id=5f84dbecff2acd6b4bfad49f55c44ea75c6470a9'/>
<id>5f84dbecff2acd6b4bfad49f55c44ea75c6470a9</id>
<content type='text'>
In DRC, one of the memcpy is called with uninitialized variable as size,
which is resulting a crash during memcpy.

As a fix all the members of structure str_bit_handler are set to zero.

Bug:115780779
Test: vendor
Change-Id: Ib991f7ca6fde9d448b975b4a9fa34234fa54231e
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In DRC, one of the memcpy is called with uninitialized variable as size,
which is resulting a crash during memcpy.

As a fix all the members of structure str_bit_handler are set to zero.

Bug:115780779
Test: vendor
Change-Id: Ib991f7ca6fde9d448b975b4a9fa34234fa54231e
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge "Fix for Segmentation fault in ixheaacd_sbr_dec_from_mps" into pi-dev</title>
<updated>2018-11-28T21:33:31+00:00</updated>
<author>
<name>TreeHugger Robot</name>
<email>treehugger-gerrit@google.com</email>
</author>
<published>2018-11-28T21:33:31+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_libxaac/commit/?id=657393883bf49820ba1ebc819670a22090e8f035'/>
<id>657393883bf49820ba1ebc819670a22090e8f035</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
