-
ASB-2020-04-05_4.14-p-release20077167 · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.14-p7ef1cf5a · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.14bb8ba1da · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.9-q-release6a8e9d45 · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.9-q1caf614f · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.9-p-release9dc5c332 · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.9-o-mr1eb150499 · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.9-o-releasec500ce15 · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.9-p86112a88 · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.9-od0bda86b · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.4-p-release450a5f0f · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.4-o-mr16891b26a · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.4-o-releaseab1c6fc9 · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.4-pee05bdf8 · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_4.4-o43349871 · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_3.18-o-mr179528f85 · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_3.18-o-release243a167c · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
ASB-2020-04-05_3.1826b295ce · ·
https://source.android.com/security/bulletin/2020-04-01 CVE-2019-19524 CVE-2019-19532 CVE-2019-19807
-
acpi-5.7-rc1-233ae7f71 · ·
Additional ACPI updates for 5.7-rc1 - Update the ACPICA code in the kernel to upstream revision 20200326 including: * Fix for a typo in a comment field (Bob Moore). * acpiExec namespace init file fixes (Bob Moore). * Addition of NHLT to the known tables list (Cezary Rojewski). * Conversion of PlatformCommChannel ASL keyword to PCC (Erik Kaneda). * acpiexec cleanup (Erik Kaneda). * WSMT-related typo fix (Erik Kaneda). * sprintf() utility function fix (John Levon). * IVRS IVHD type 11h parsing implementation (Michał Żygowski). * IVRS IVHD type 10h reserved field name fix (Michał Żygowski). - Fix ACPI-related CPU hotplug deadlock on x86 (Qian Cai). - Fix Intel Tiger Lake ACPI device IDs in several places (Gayatri Kammela). - Add ACPI backlight blacklist entry for Acer Aspire 5783z (Hans de Goede). - Fix documentation of the "acpi_backlight" kernel command line switch (Randy Dunlap). - Clean up the acpi_get_psd_map() CPPC library routine (Liguang Zhang).