mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-12-27 00:19:26 -05:00
Remove some duplicate CVE patches and add back fixed CVE patcher scripts
This commit is contained in:
parent
e1a0ab6afd
commit
12b63c12b7
@ -1,31 +0,0 @@
|
||||
From 81ce573830e9d5531531b3ec778c58e6b9167bcd Mon Sep 17 00:00:00 2001
|
||||
From: Dan Carpenter <dan.carpenter@oracle.com>
|
||||
Date: Wed, 5 Sep 2012 15:32:18 +0300
|
||||
Subject: [PATCH] ALSA: compress_core: integer overflow in
|
||||
snd_compr_allocate_buffer()
|
||||
|
||||
These are 32 bit values that come from the user, we need to check for
|
||||
integer overflows or we could end up allocating a smaller buffer than
|
||||
expected.
|
||||
|
||||
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
|
||||
Signed-off-by: Takashi Iwai <tiwai@suse.de>
|
||||
---
|
||||
sound/core/compress_offload.c | 4 ++++
|
||||
1 file changed, 4 insertions(+)
|
||||
|
||||
diff --git a/sound/core/compress_offload.c b/sound/core/compress_offload.c
|
||||
index eb60cb8dbb8a6..68fe02c7400a2 100644
|
||||
--- a/sound/core/compress_offload.c
|
||||
+++ b/sound/core/compress_offload.c
|
||||
@@ -407,6 +407,10 @@ static int snd_compr_allocate_buffer(struct snd_compr_stream *stream,
|
||||
unsigned int buffer_size;
|
||||
void *buffer;
|
||||
|
||||
+ if (params->buffer.fragment_size == 0 ||
|
||||
+ params->buffer.fragments > SIZE_MAX / params->buffer.fragment_size)
|
||||
+ return -EINVAL;
|
||||
+
|
||||
buffer_size = params->buffer.fragment_size * params->buffer.fragments;
|
||||
if (stream->ops->copy) {
|
||||
buffer = NULL;
|
@ -1,59 +0,0 @@
|
||||
From adaad9d866105bcb8f87293a0a675f573a39129d Mon Sep 17 00:00:00 2001
|
||||
From: Vladis Dronov <vdronov@redhat.com>
|
||||
Date: Thu, 31 Mar 2016 10:53:42 -0700
|
||||
Subject: Input: gtco - fix crash on detecting device without endpoints
|
||||
|
||||
commit 162f98dea487206d9ab79fc12ed64700667a894d upstream.
|
||||
|
||||
The gtco driver expects at least one valid endpoint. If given malicious
|
||||
descriptors that specify 0 for the number of endpoints, it will crash in
|
||||
the probe function. Ensure there is at least one endpoint on the interface
|
||||
before using it.
|
||||
|
||||
Also let's fix a minor coding style issue.
|
||||
|
||||
The full correct report of this issue can be found in the public
|
||||
Red Hat Bugzilla:
|
||||
|
||||
https://bugzilla.redhat.com/show_bug.cgi?id=1283385
|
||||
|
||||
Reported-by: Ralf Spenneberg <ralf@spenneberg.net>
|
||||
Signed-off-by: Vladis Dronov <vdronov@redhat.com>
|
||||
Cc: stable@vger.kernel.org
|
||||
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
|
||||
Signed-off-by: Willy Tarreau <w@1wt.eu>
|
||||
---
|
||||
drivers/input/tablet/gtco.c | 10 +++++++++-
|
||||
1 file changed, 9 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/drivers/input/tablet/gtco.c b/drivers/input/tablet/gtco.c
|
||||
index 29e01ab..a9f8f92 100644
|
||||
--- a/drivers/input/tablet/gtco.c
|
||||
+++ b/drivers/input/tablet/gtco.c
|
||||
@@ -869,6 +869,14 @@ static int gtco_probe(struct usb_interface *usbinterface,
|
||||
goto err_free_buf;
|
||||
}
|
||||
|
||||
+ /* Sanity check that a device has an endpoint */
|
||||
+ if (usbinterface->altsetting[0].desc.bNumEndpoints < 1) {
|
||||
+ dev_err(&usbinterface->dev,
|
||||
+ "Invalid number of endpoints\n");
|
||||
+ error = -EINVAL;
|
||||
+ goto err_free_urb;
|
||||
+ }
|
||||
+
|
||||
/*
|
||||
* The endpoint is always altsetting 0, we know this since we know
|
||||
* this device only has one interrupt endpoint
|
||||
@@ -890,7 +898,7 @@ static int gtco_probe(struct usb_interface *usbinterface,
|
||||
* HID report descriptor
|
||||
*/
|
||||
if (usb_get_extra_descriptor(usbinterface->cur_altsetting,
|
||||
- HID_DEVICE_TYPE, &hid_desc) != 0){
|
||||
+ HID_DEVICE_TYPE, &hid_desc) != 0) {
|
||||
dev_err(&usbinterface->dev,
|
||||
"Can't retrieve exta USB descriptor to get hid report descriptor length\n");
|
||||
error = -EIO;
|
||||
--
|
||||
cgit v1.1
|
||||
|
@ -1,53 +0,0 @@
|
||||
From 2633b8df3dff0377066fb32feb8ef06ae834d7ff Mon Sep 17 00:00:00 2001
|
||||
From: Badhri Jagan Sridharan <Badhri@google.com>
|
||||
Date: Tue, 30 Aug 2016 13:33:55 -0700
|
||||
Subject: UPSTREAM: USB: mct_u232: add sanity checking in probe
|
||||
|
||||
commit 4e9a0b05257f29cf4b75f3209243ed71614d062e upstream.
|
||||
|
||||
An attack using the lack of sanity checking in probe is known. This
|
||||
patch checks for the existence of a second port.
|
||||
|
||||
CVE-2016-3136
|
||||
BUG: 28242610
|
||||
Signed-off-by: Oliver Neukum <ONeukum@suse.com>
|
||||
[johan: add error message ]
|
||||
Signed-off-by: Johan Hovold <johan@kernel.org>
|
||||
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
|
||||
|
||||
Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com>
|
||||
Change-Id: I284ad648c2087c34a098d67e0cc6d948a568413c
|
||||
---
|
||||
drivers/usb/serial/mct_u232.c | 9 ++++++++-
|
||||
1 file changed, 8 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/drivers/usb/serial/mct_u232.c b/drivers/usb/serial/mct_u232.c
|
||||
index 6a15adf..c14c29f 100644
|
||||
--- a/drivers/usb/serial/mct_u232.c
|
||||
+++ b/drivers/usb/serial/mct_u232.c
|
||||
@@ -377,14 +377,21 @@ static void mct_u232_msr_to_state(struct usb_serial_port *port,
|
||||
|
||||
static int mct_u232_port_probe(struct usb_serial_port *port)
|
||||
{
|
||||
+ struct usb_serial *serial = port->serial;
|
||||
struct mct_u232_private *priv;
|
||||
|
||||
+ /* check first to simplify error handling */
|
||||
+ if (!serial->port[1] || !serial->port[1]->interrupt_in_urb) {
|
||||
+ dev_err(&port->dev, "expected endpoint missing\n");
|
||||
+ return -ENODEV;
|
||||
+ }
|
||||
+
|
||||
priv = kzalloc(sizeof(*priv), GFP_KERNEL);
|
||||
if (!priv)
|
||||
return -ENOMEM;
|
||||
|
||||
/* Use second interrupt-in endpoint for reading. */
|
||||
- priv->read_urb = port->serial->port[1]->interrupt_in_urb;
|
||||
+ priv->read_urb = serial->port[1]->interrupt_in_urb;
|
||||
priv->read_urb->context = port;
|
||||
|
||||
spin_lock_init(&priv->lock);
|
||||
--
|
||||
cgit v1.1
|
||||
|
@ -1,39 +0,0 @@
|
||||
From 801c5f937ef7edb23e411bc00d3695496b89dca2 Mon Sep 17 00:00:00 2001
|
||||
From: Badhri Jagan Sridharan <Badhri@google.com>
|
||||
Date: Tue, 30 Aug 2016 13:39:02 -0700
|
||||
Subject: UPSTREAM: USB: cdc-acm: more sanity checking
|
||||
|
||||
commit 8835ba4a39cf53f705417b3b3a94eb067673f2c9 upstream.
|
||||
|
||||
An attack has become available which pretends to be a quirky
|
||||
device circumventing normal sanity checks and crashes the kernel
|
||||
by an insufficient number of interfaces. This patch adds a check
|
||||
to the code path for quirky devices.
|
||||
|
||||
BUG: 28242610
|
||||
|
||||
Signed-off-by: Oliver Neukum <ONeukum@suse.com>
|
||||
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
|
||||
Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com>
|
||||
Change-Id: I9a5f7f3c704b65e866335054f470451fcfae9d1c
|
||||
---
|
||||
drivers/usb/class/cdc-acm.c | 3 +++
|
||||
1 file changed, 3 insertions(+)
|
||||
|
||||
diff --git a/drivers/usb/class/cdc-acm.c b/drivers/usb/class/cdc-acm.c
|
||||
index 9b1cbcf..f519d28 100644
|
||||
--- a/drivers/usb/class/cdc-acm.c
|
||||
+++ b/drivers/usb/class/cdc-acm.c
|
||||
@@ -972,6 +972,9 @@ static int acm_probe(struct usb_interface *intf,
|
||||
if (quirks == NO_UNION_NORMAL) {
|
||||
data_interface = usb_ifnum_to_if(usb_dev, 1);
|
||||
control_interface = usb_ifnum_to_if(usb_dev, 0);
|
||||
+ /* we would crash */
|
||||
+ if (!data_interface || !control_interface)
|
||||
+ return -ENODEV;
|
||||
goto skip_normal_probe;
|
||||
}
|
||||
|
||||
--
|
||||
cgit v1.1
|
||||
|
@ -1,57 +0,0 @@
|
||||
From 129e6372f40a423bcded0a6dae547205edf652fb Mon Sep 17 00:00:00 2001
|
||||
From: Oliver Neukum <oneukum@suse.com>
|
||||
Date: Thu, 31 Mar 2016 12:04:26 -0400
|
||||
Subject: USB: digi_acceleport: do sanity checking for the number of ports
|
||||
|
||||
commit 5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f upstream.
|
||||
|
||||
The driver can be crashed with devices that expose crafted descriptors
|
||||
with too few endpoints.
|
||||
|
||||
See: http://seclists.org/bugtraq/2016/Mar/61
|
||||
|
||||
Signed-off-by: Oliver Neukum <ONeukum@suse.com>
|
||||
[johan: fix OOB endpoint check and add error messages ]
|
||||
Cc: stable <stable@vger.kernel.org>
|
||||
Signed-off-by: Johan Hovold <johan@kernel.org>
|
||||
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
|
||||
Signed-off-by: Willy Tarreau <w@1wt.eu>
|
||||
---
|
||||
drivers/usb/serial/digi_acceleport.c | 19 +++++++++++++++++++
|
||||
1 file changed, 19 insertions(+)
|
||||
|
||||
diff --git a/drivers/usb/serial/digi_acceleport.c b/drivers/usb/serial/digi_acceleport.c
|
||||
index 7b807d3..8c34d9c 100644
|
||||
--- a/drivers/usb/serial/digi_acceleport.c
|
||||
+++ b/drivers/usb/serial/digi_acceleport.c
|
||||
@@ -1253,8 +1253,27 @@ static int digi_port_init(struct usb_serial_port *port, unsigned port_num)
|
||||
|
||||
static int digi_startup(struct usb_serial *serial)
|
||||
{
|
||||
+ struct device *dev = &serial->interface->dev;
|
||||
struct digi_serial *serial_priv;
|
||||
int ret;
|
||||
+ int i;
|
||||
+
|
||||
+ /* check whether the device has the expected number of endpoints */
|
||||
+ if (serial->num_port_pointers < serial->type->num_ports + 1) {
|
||||
+ dev_err(dev, "OOB endpoints missing\n");
|
||||
+ return -ENODEV;
|
||||
+ }
|
||||
+
|
||||
+ for (i = 0; i < serial->type->num_ports + 1 ; i++) {
|
||||
+ if (!serial->port[i]->read_urb) {
|
||||
+ dev_err(dev, "bulk-in endpoint missing\n");
|
||||
+ return -ENODEV;
|
||||
+ }
|
||||
+ if (!serial->port[i]->write_urb) {
|
||||
+ dev_err(dev, "bulk-out endpoint missing\n");
|
||||
+ return -ENODEV;
|
||||
+ }
|
||||
+ }
|
||||
|
||||
serial_priv = kzalloc(sizeof(*serial_priv), GFP_KERNEL);
|
||||
if (!serial_priv)
|
||||
--
|
||||
cgit v1.1
|
||||
|
@ -1,40 +0,0 @@
|
||||
From 7ca573e32c0a6634d679540314a80d235f224bfb Mon Sep 17 00:00:00 2001
|
||||
From: Oliver Neukum <oneukum@suse.com>
|
||||
Date: Thu, 17 Mar 2016 14:00:17 -0700
|
||||
Subject: [PATCH] Input: ims-pcu - sanity check against missing interfaces
|
||||
|
||||
[ Upstream commit a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff ]
|
||||
|
||||
A malicious device missing interface can make the driver oops.
|
||||
Add sanity checking.
|
||||
|
||||
Signed-off-by: Oliver Neukum <ONeukum@suse.com>
|
||||
CC: stable@vger.kernel.org
|
||||
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
|
||||
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
|
||||
---
|
||||
drivers/input/misc/ims-pcu.c | 4 ++++
|
||||
1 file changed, 4 insertions(+)
|
||||
|
||||
diff --git a/drivers/input/misc/ims-pcu.c b/drivers/input/misc/ims-pcu.c
|
||||
index afed8e2b2f944..41ef29b516f35 100644
|
||||
--- a/drivers/input/misc/ims-pcu.c
|
||||
+++ b/drivers/input/misc/ims-pcu.c
|
||||
@@ -1663,6 +1663,8 @@ static int ims_pcu_parse_cdc_data(struct usb_interface *intf, struct ims_pcu *pc
|
||||
|
||||
pcu->ctrl_intf = usb_ifnum_to_if(pcu->udev,
|
||||
union_desc->bMasterInterface0);
|
||||
+ if (!pcu->ctrl_intf)
|
||||
+ return -EINVAL;
|
||||
|
||||
alt = pcu->ctrl_intf->cur_altsetting;
|
||||
pcu->ep_ctrl = &alt->endpoint[0].desc;
|
||||
@@ -1670,6 +1672,8 @@ static int ims_pcu_parse_cdc_data(struct usb_interface *intf, struct ims_pcu *pc
|
||||
|
||||
pcu->data_intf = usb_ifnum_to_if(pcu->udev,
|
||||
union_desc->bSlaveInterface0);
|
||||
+ if (!pcu->data_intf)
|
||||
+ return -EINVAL;
|
||||
|
||||
alt = pcu->data_intf->cur_altsetting;
|
||||
if (alt->desc.bNumEndpoints != 2) {
|
@ -1,45 +0,0 @@
|
||||
From 9d5a0bc7f6318821fddf9fc0ac9a05e58bb00a6b Mon Sep 17 00:00:00 2001
|
||||
From: Sungjun Park <sjpark@codeaurora.org>
|
||||
Date: Mon, 23 Jan 2017 13:28:44 -0800
|
||||
Subject: bluetooth: Fix free data pointer routine
|
||||
|
||||
Data pointer has been reused after freed it. So,
|
||||
it has been moved to after using the data pointer
|
||||
to clean up resource and freed it.
|
||||
|
||||
Change-Id: Ibc94e092134ff1f36e896c679ade7f639254a24d
|
||||
Signed-off-by: Sungjun Park <sjpark@codeaurora.org>
|
||||
---
|
||||
drivers/bluetooth/btfm_slim.c | 5 +++--
|
||||
1 file changed, 3 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/drivers/bluetooth/btfm_slim.c b/drivers/bluetooth/btfm_slim.c
|
||||
index 5fb00b9..1c6e256 100644
|
||||
--- a/drivers/bluetooth/btfm_slim.c
|
||||
+++ b/drivers/bluetooth/btfm_slim.c
|
||||
@@ -1,4 +1,4 @@
|
||||
-/* Copyright (c) 2016, The Linux Foundation. All rights reserved.
|
||||
+/* Copyright (c) 2017, The Linux Foundation. All rights reserved.
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 and
|
||||
@@ -509,7 +509,6 @@ static int btfm_slim_remove(struct slim_device *slim)
|
||||
BTFMSLIM_DBG("");
|
||||
mutex_destroy(&btfm_slim->io_lock);
|
||||
mutex_destroy(&btfm_slim->xfer_lock);
|
||||
- kfree(btfm_slim);
|
||||
snd_soc_unregister_codec(&slim->dev);
|
||||
|
||||
BTFMSLIM_DBG("slim_remove_device() - btfm_slim->slim_ifd");
|
||||
@@ -517,6 +516,8 @@ static int btfm_slim_remove(struct slim_device *slim)
|
||||
|
||||
BTFMSLIM_DBG("slim_remove_device() - btfm_slim->slim_pgd");
|
||||
slim_remove_device(slim);
|
||||
+
|
||||
+ kfree(btfm_slim);
|
||||
return 0;
|
||||
}
|
||||
|
||||
--
|
||||
cgit v1.1
|
||||
|
@ -1,5 +1,4 @@
|
||||
#!/bin/bash
|
||||
#Tested working 2017/10/30????
|
||||
cd $base"kernel/amazon/hdx-common"
|
||||
git apply $cvePatches/CVE-2012-6704/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-1739/ANY/0.patch
|
||||
|
@ -0,0 +1,10 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/asus/msm8916"
|
||||
git apply $cvePatches/CVE-2014-9781/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-10233/3.10/1.patch
|
||||
git apply $cvePatches/CVE-2016-3134/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2016-3857/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2016-6672/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-8394/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0750/ANY/0.patch
|
||||
cd $base
|
@ -0,0 +1,9 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/fairphone/msm8974"
|
||||
git apply $cvePatches/CVE-2016-3672/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0430/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0750/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0786/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-15265/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6348/ANY/0.patch
|
||||
cd $base
|
@ -0,0 +1,60 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/google/marlin"
|
||||
git apply $cvePatches/CVE-2014-9900/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-2041/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-7515/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-8966/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-10044/ANY/2.patch
|
||||
git apply $cvePatches/CVE-2016-10153/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-10231/ANY/1.patch
|
||||
git apply $cvePatches/CVE-2016-2187/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2544/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2549/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2847/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3136/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3140/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3156/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3865/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3865/ANY/1.patch
|
||||
git apply $cvePatches/CVE-2016-3906/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5342/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5345/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5854/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5856/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5857/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5867/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5870/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-6672/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-7042/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-8418/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-8483/3.18/0.patch
|
||||
git apply $cvePatches/CVE-2016-9604/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0510/3.18/1.patch
|
||||
git apply $cvePatches/CVE-2017-0537/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0622/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0627/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0750/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-1000365/3.18/1.patch
|
||||
git apply $cvePatches/CVE-2017-10998/3.18/1.patch
|
||||
git apply $cvePatches/CVE-2017-11001/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-11002/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-12146/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-15265/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-2671/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-5669/ANY/1.patch
|
||||
git apply $cvePatches/CVE-2017-6348/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6951/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7371/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7372/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7472/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7487/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7616/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7618/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-8247/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-8280/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-9242/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-9676/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-9686/3.18/0.patch
|
||||
git apply $cvePatches/CVE-2017-9687/3.18/0.patch
|
||||
git apply $cvePatches/CVE-2017-9697/3.18/0.patch
|
||||
cd $base
|
@ -0,0 +1,12 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/google/msm"
|
||||
git apply $cvePatches/CVE-2014-9781/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-1593/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3859/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-8402/3.4/1.patch
|
||||
git apply $cvePatches/CVE-2016-8404/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0750/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0751/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0786/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-15265/ANY/0.patch
|
||||
cd $base
|
@ -0,0 +1,25 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/htc/flounder"
|
||||
git apply $cvePatches/CVE-2014-9892/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-9900/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-4177/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-7515/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-8944/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-0819/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-8453/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-8464/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2016-9604/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0449/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0537/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0750/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0794/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2017-10996/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-15265/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-2671/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-5669/ANY/1.patch
|
||||
git apply $cvePatches/CVE-2017-5970/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6348/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6951/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7472/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-9242/ANY/0.patch
|
||||
cd $base
|
@ -0,0 +1,49 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/bullhead"
|
||||
git apply $cvePatches/CVE-2014-8160/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-8173/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-9781/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-2041/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-4177/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-7515/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-7550/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-0805/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-10231/ANY/1.patch
|
||||
git apply $cvePatches/CVE-2016-10233/3.10/1.patch
|
||||
git apply $cvePatches/CVE-2016-2063/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2185/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2186/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2187/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2384/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2544/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2545/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2547/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2549/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3070/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3134/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2016-3136/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3140/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3672/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3689/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3857/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2016-5345/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5859/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5867/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5870/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-8404/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-9604/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0436/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0510/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2017-0516/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0523/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0537/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-15265/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-2618/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2017-2671/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-5669/ANY/1.patch
|
||||
git apply $cvePatches/CVE-2017-6348/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6951/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7472/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7487/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-9242/ANY/0.patch
|
||||
cd $base
|
@ -0,0 +1,20 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/lge/hammerhead"
|
||||
git apply $cvePatches/CVE-2014-9881/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-1593/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5829/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-9604/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0611/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0750/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0751/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0786/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-15265/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-2671/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-5970/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6074/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6348/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6951/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7487/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-8247/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-9242/ANY/0.patch
|
||||
cd $base
|
@ -0,0 +1,53 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/moto/shamu"
|
||||
git apply $cvePatches/CVE-2014-8160/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-8173/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-9420/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-9683/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-9715/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-9781/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-1593/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-2041/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-4177/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-7515/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-7550/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-8967/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-0758/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-10233/3.10/1.patch
|
||||
git apply $cvePatches/CVE-2016-2185/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2186/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2187/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2384/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2544/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2545/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2547/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2549/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3070/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3134/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2016-3136/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3138/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3140/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3689/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3857/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2016-3865/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3865/ANY/1.patch
|
||||
git apply $cvePatches/CVE-2016-5342/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5870/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-6672/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-8404/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-8464/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2016-9604/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0404/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0537/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0627/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0750/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-2618/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2017-2671/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-5669/ANY/1.patch
|
||||
git apply $cvePatches/CVE-2017-6348/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6951/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7472/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7487/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-8269/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-9242/ANY/0.patch
|
||||
cd $base
|
@ -0,0 +1,25 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/motorola/msm8916"
|
||||
git apply $cvePatches/CVE-2014-9420/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-9781/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-1593/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-7515/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-8967/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-10231/ANY/1.patch
|
||||
git apply $cvePatches/CVE-2016-10233/3.10/1.patch
|
||||
git apply $cvePatches/CVE-2016-3134/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2016-3672/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3857/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2016-3865/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-3865/ANY/1.patch
|
||||
git apply $cvePatches/CVE-2016-3902/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5859/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-5867/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-6672/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0457/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2017-0457/3.10/1.patch
|
||||
git apply $cvePatches/CVE-2017-0750/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0794/3.10/0.patch
|
||||
git apply $cvePatches/CVE-2017-15265/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6348/ANY/0.patch
|
||||
cd $base
|
@ -0,0 +1,6 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/nextbit/msm8992"
|
||||
git apply $cvePatches/CVE-2014-9904/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-6672/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0750/ANY/0.patch
|
||||
cd $base
|
@ -0,0 +1,25 @@
|
||||
#!/bin/bash
|
||||
cd $base"kernel/samsung/smdk4412"
|
||||
git apply $cvePatches/CVE-2014-1739/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-4656/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-9420/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-9781/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-9870/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2014-9900/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2015-8944/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-0819/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2185/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2186/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-2544/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-6753/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2016-9604/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0403/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0404/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0430/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-0786/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-10662/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-15265/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6074/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-6348/ANY/0.patch
|
||||
git apply $cvePatches/CVE-2017-7487/ANY/0.patch
|
||||
cd $base
|
Loading…
Reference in New Issue
Block a user