<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xavi/android_kernel_m2note/drivers/misc/mediatek/videox/mt6735/debug.c, branch ng-7.1.2</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2</id>
<link rel='self' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2'/>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/'/>
<updated>2017-12-18T22:39:47+00:00</updated>
<entry>
<title>mtk: videox&amp;systracker: fix memset-transposed-args warnings</title>
<updated>2017-12-18T22:39:47+00:00</updated>
<author>
<name>Mister Oyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-12-18T22:39:47+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=d6b16200598a3d46852afedbb429d3d9a7ee79c2'/>
<id>urn:sha1:d6b16200598a3d46852afedbb429d3d9a7ee79c2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>MediaTek: Elevation of privilege vulnerability in MediaTek video driver</title>
<updated>2017-11-20T17:13:41+00:00</updated>
<author>
<name>Cesar Matias</name>
<email>cesar.maximo@gmail.com</email>
</author>
<published>2017-02-13T23:49:46+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=431fc4f26f963e827fd1e3693b41e2dc853e9fbc'/>
<id>urn:sha1:431fc4f26f963e827fd1e3693b41e2dc853e9fbc</id>
<content type='text'>
CVE-2016-3936, CVE-2016-3937

An elevation of privilege vulnerability in the MediaTek video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process

Signed-off-by: Moyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>Fix "Elevation of privilege vulnerability in MediaTek video driver"</title>
<updated>2017-04-11T08:59:46+00:00</updated>
<author>
<name>fire855</name>
<email>thefire855@gmail.com</email>
</author>
<published>2017-02-12T01:37:10+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=e8ffd61e293c240372e3d40c28f1719c4f4a9f85'/>
<id>urn:sha1:e8ffd61e293c240372e3d40c28f1719c4f4a9f85</id>
<content type='text'>
CVE-2016-3936, CVE-2016-3937

An elevation of privilege vulnerability in the MediaTek video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
</content>
</entry>
<entry>
<title>first commit</title>
<updated>2016-08-15T02:19:42+00:00</updated>
<author>
<name>Meizu OpenSource</name>
<email>patchwork@meizu.com</email>
</author>
<published>2016-08-15T02:19:42+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=d2e1446d81725c351dc73a03b397ce043fb18452'/>
<id>urn:sha1:d2e1446d81725c351dc73a03b397ce043fb18452</id>
<content type='text'>
</content>
</entry>
</feed>
