2021-03-22 19:59:15 -04:00
|
|
|
#!/bin/bash
|
|
|
|
cd "$DOS_BUILD_BASE""kernel/samsung/jf"
|
2021-04-07 22:45:57 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0007.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4737/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/^3.17.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/^3.17/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/^3.17/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9410/ANY/msm.git-43b4ff3bf3fbb02e85defcea939629f46506a217.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0568/ANY/msm.git-8de3fe39e7c40190f82832253ed5946714e5bff1.patch
|
2021-04-02 11:58:38 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/^4.4.1/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/ANY/0001.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/3.4/0004.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/^4.2.2/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/^4.5/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/^4.5/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.4/0002.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.4/0018.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.4/0019.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/3.4/0002.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.4/0010.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/3.4/0007.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3809/3.4/0002.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3854/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.4/0001.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3907/3.4/0003.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/^4.5.5/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/^4.5.5/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/^4.6.3/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/^4.6.3/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/^4.7/0001.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6742/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6791/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7916/3.4/0010.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.4/0008.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10233/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0430/3.4/0002.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0457/3.4/0001.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0463/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/3.4/0004.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0568/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0568/3.4/0004.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0571/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0573/3.4/0002.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.4/0004.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0633/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0706/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/3.4/0002.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/3.4/0007.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0791/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2636/3.4/0010.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/3.4/0008.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/^4.10.11/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8254/3.4/0002.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.4/0007.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/^4.14.3/0001.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/3.4/0005.patch
|
2021-08-03 14:46:16 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9714/prima/0003.patch --directory=drivers/staging/prima
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9725/3.4/0006.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/^4.11.7/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10662/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/^4.12.4/0001.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10998/3.4/0003.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11015/prima/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/3.4/0002.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/^4.11.9/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/^4.12.2/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/^4.12/0001.patch
|
2021-08-03 14:46:16 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13078/prima/0001.patch --directory=drivers/staging/prima
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13080/3.4/0009.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.4/0076.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0012.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0013.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0015.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0016.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0017.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0018.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.4/0008.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/^4.12.9/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/^4.12/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/^4.13.2/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch
|
2021-07-10 09:02:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.4/0009.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch
|
2021-08-03 14:46:16 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15819/prima/0002.patch --directory=drivers/staging/prima
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13.6/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13.11/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13.11/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/^4.14.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/^4.14.8/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/^4.14.3/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/^4.11/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/^4.11.3/0001.patch
|
2021-07-04 14:20:57 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.4/0006.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000251/3.4/0006.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/^4.14.13/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/^4.14.13/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/^4.14.15/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch
|
2021-08-03 14:46:16 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5835/prima/0001.patch --directory=drivers/staging/prima
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/^4.14.7/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/^4.15/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/^4.15.7/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/^4.15.7/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/^4.15/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/^4.16/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/^4.13/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/^4.13/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/^4.12.9/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/ANY/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/^4.16.6/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/^4.17.1/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/^4.18.1/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/^4.18.6/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/^4.19/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9454/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/^5.0.17/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch
|
2021-04-12 21:24:57 -04:00
|
|
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11599/^4.9/0009.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/^5.0.14/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/^5.1.13/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/^5.3.5/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/^5.3.11/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/^5.3.11/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/^5.3.11/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/^5.0.6/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/^5.1/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/ANY/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/^3.18/0001.patch
|
2021-07-04 14:20:57 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.4/0015.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/^5.5.6/0001.patch
|
2021-07-04 14:20:57 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/3.4/0010.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/ANY/0001.patch
|
2021-06-07 22:06:28 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch
|
2021-07-04 14:20:57 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/3.4/0002.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/^5.6.2/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/^5.6.10/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/^5.7.1/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
2021-07-04 14:20:57 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.4/0008.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/^5.5/0002.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/^5.10/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
2021-07-04 14:20:57 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.4/0008.patch
|
2021-06-16 02:41:29 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
2021-04-10 18:21:37 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
2021-07-21 02:10:08 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
2021-07-26 23:43:46 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
2021-03-24 15:16:30 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
2021-03-22 19:59:15 -04:00
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
|
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
2021-08-03 16:57:20 -04:00
|
|
|
editKernelLocalversion "-dos.p305"
|
2021-03-22 19:59:15 -04:00
|
|
|
cd "$DOS_BUILD_BASE"
|