Tags give the ability to mark specific points in history as being important
-
ASB-2020-12-05_4.14-p
42a11116 · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.14-stable
f5e74ee2 · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.9-q-release
2c05840a · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.9-q
e3ee521e · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.9-p-release
3418ca76 · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.9-o-mr1
71466ec7 · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.9-o-release
82e43519 · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.9-p
15d2b30d · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.9-o
f7c03737 · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.4-p-release
8b53522d · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.4-o-mr1
062e1ce1 · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.4-o-release
0ec5bc1b · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.4-p
4cb652f2 · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_4.4-o
28eac0c4 · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_3.18-o-mr1
1d90193c · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_3.18-o-release
2a851e18 · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
ASB-2020-12-05_3.18
2766cd18 · ·https://source.android.com/security/bulletin/2020-12-01 CVE-2020-0444 CVE-2020-0465 CVE-2020-0466
-
-
x86-urgent-2020-12-06
84da009f · ·A set of fixes for x86: - Make the AMD L3 QoS code and data priorization enable/disable mechanism work correctly. The control bit was only set/cleared on one of the CPUs in a L3 domain, but it has to be modified on all CPUs in the domain. The initial documentation was not clear about this, but the updated one from Oct 2020 spells it out. - Fix an off by one in the UV platform detection code which causes the UV hubs to be identified wrongly. The chip revisions start at 1 not at 0. - Fix a long standing bug in the evaluation of prefixes in the uprobes code which fails to handle repeated prefixes properly. The aggregate size of the prefixes can be larger than the bytes array but the code blindly iterated over the aggregate size beyond the array boundary. Add a macro to handle this case properly and use it at the affected places.
-
perf-urgent-2020-12-06
fc17db8a · ·Two fixes for performance monitoring on X86: - Add recursion protection to another callchain invoked from x86_pmu_stop() which can recurse back into x86_pmu_stop(). The first attempt to fix this missed this extra code path. - Use the already filtered status variable to check for PEBS counter overflow bits and not the unfiltered full status read from IA32_PERF_GLOBAL_STATUS which can have unrelated bits check which would be evaluated incorrectly.