From 13fd3fab51bb8cc9a36288e44bb3f3ba6af92ee2 Mon Sep 17 00:00:00 2001 From: Tad Date: Sun, 22 Jul 2018 17:08:22 -0400 Subject: [PATCH] fugu fixes --- .../CVE_Patchers/android_kernel_asus_fugu.sh | 155 ++++++++++++++++++ Scripts/LineageOS-14.1/Patch.sh | 3 + .../CVE_Patchers/android_kernel_asus_fugu.sh | 2 +- Scripts/LineageOS-15.1/Patch.sh | 3 + 4 files changed, 162 insertions(+), 1 deletion(-) create mode 100644 Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_fugu.sh diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_fugu.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_fugu.sh new file mode 100644 index 00000000..4f7be90d --- /dev/null +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_fugu.sh @@ -0,0 +1,155 @@ +#!/bin/bash +cd "$DOS_BUILD_BASE""kernel/asus/fugu" +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/0007-Copperhead-Kernel_Hardening/3.10/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/0010-Accelerated_AES/3.10+/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0013-syskaller-Misc/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0206/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1739/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2523/^3.13/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3145/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4656/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4943/^3.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/^3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9420/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9683/^3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9715/^3.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9922/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9922/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1420/3.2-^3.19/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/^4.3/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8019/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10-^3.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/^4.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2438/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/^4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/^4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5829/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7097/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7097/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8453/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9794/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0449/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0571/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0573/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0706/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0791/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/^4.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10663/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/^4.14/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/^4.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/^4.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/^4.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/^4.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/^4.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/^4.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/^4.13/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5+/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/^4.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6074/^4.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/^4.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/^4.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.14/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8890/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/ANY/0001.patch +editKernelLocalversion "-dos.p151" +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/Patch.sh b/Scripts/LineageOS-14.1/Patch.sh index ac1d9d43..0a7a9591 100755 --- a/Scripts/LineageOS-14.1/Patch.sh +++ b/Scripts/LineageOS-14.1/Patch.sh @@ -219,6 +219,9 @@ rm board-info.txt; #Never restrict installation enterAndClear "device/oneplus/bacon"; sed -i "s/TZ.BF.2.0-2.0.0134/TZ.BF.2.0-2.0.0134|TZ.BF.2.0-2.0.0137/" board-info.txt; #Suport new TZ firmware https://review.lineageos.org/#/c/178999/ +enter "vendor/google"; +echo "" > atv/atv-common.mk; + #Make changes to all devices cd "$DOS_BUILD_BASE"; if [ "$DOS_LOWRAM_ENABLED" = true ]; then find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableLowRam "$0"' {} \;; fi; diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh index 8870f990..f2a86340 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh @@ -128,7 +128,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/^4.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch editKernelLocalversion "-dos.p131" diff --git a/Scripts/LineageOS-15.1/Patch.sh b/Scripts/LineageOS-15.1/Patch.sh index 027ffa65..ed10a29e 100755 --- a/Scripts/LineageOS-15.1/Patch.sh +++ b/Scripts/LineageOS-15.1/Patch.sh @@ -202,6 +202,9 @@ rm setup-makefiles.sh; enterAndClear "device/oppo/msm8974-common"; sed -i "s/TZ.BF.2.0-2.0.0134/TZ.BF.2.0-2.0.0134|TZ.BF.2.0-2.0.0137/" board-info.txt; #Suport new TZ firmware https://review.lineageos.org/#/c/178999/ +enter "vendor/google"; +echo "" > atv/atv-common.mk; + #Make changes to all devices cd "$DOS_BUILD_BASE"; if [ "$DOS_LOWRAM_ENABLED" = true ]; then find "device" -maxdepth 2 -mindepth 2 -type d -exec bash -c 'enableLowRam "$0"' {} \;; fi;