flo: update prebuilt kernel

624b54b tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)
066b756 Replace %p with %pK to prevent leaking kernel address
8afa5f8 msm: perf: Do not allocate new hw_event if event is duplicate.
dc901a5 USB: fix invalid memory access in hub_activate()
877f6d8 msm: camera: sensor: Validate step_boundary
4c291fb mmc: core : fix arbitrary read/write to user space
1e2f4fc n_tty: Fix n_tty_write crash when echoing in raw mode
d910042 msm: vidc: Validate userspace buffer count
26eed7f msm: vidc: Validate userspace buffer count before using it
37836aa qseecom: Validate the incoming length from user space
6e653ff msm: actuator: fix to prevent kernel heap buffer overflow
f601636 diag: Fix for diag debugfs buffer overflow
8064a62 From a7502f4f801bb95bff73617309835bb7a016cde5 Mon Sep 17 00:00:00 2001 From: Xu Han <hanxu@codeaurora.org> Date: Wed, 25 Sep 2013 15:28:32 -0700 Subject: msm: camera: Checking an enum value greater than zero
2021b89 msm: camera: Fix various small issues in cci driver
451ba15 msm: camera: Fix various small issues in Actuator driver
93999e6 msm: ipc: Detect integer overflow before it happens
82e4047 msm: ipc: Add check to avoid integer & buffer overflow
18cd721 Add bounds check before copying data to prevent buffer overflow.
0ac643a qseecom: Change __copy_from_user to copy_from_user
b350fa1 wlan: Userspace data copy fix

Linux version 3.4.0-g624b54b (android-build@kpfk2.cbf.corp.google.com)
(gcc version 4.8 (GCC) ) #1 SMP PREEMPT Tue May 24 22:17:36 UTC 2016 (mnc-mr1)

Bug: 27532522
Bug: 27890772
Bug: 28409131
Bug: 28410333
Bug: 28430703
Bug: 28431531
Bug: 28441831
Bug: 28442449
Bug: 28469042
Bug: 28557260
Bug: 28571496
Bug: 28598501
Bug: 28598515
Bug: 28712303
Bug: 28769136
Bug: 28803396

Change-Id: I3b992f4e3d29bb1199b2b6ee758b7a4d297daf2e
Signed-off-by: Patrick Tjin <pattjin@google.com>
1 file changed
tree: 3f62dbf356052a5f755dfa715a0d3116c86381d1
  1. kernel