mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-05-02 06:26:20 -04:00
Update CVE patchers
Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
parent
7f993eb84f
commit
2c27a88a24
86 changed files with 305 additions and 151 deletions
|
@ -126,6 +126,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p127"
|
||||
editKernelLocalversion "-dos.p128"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -55,7 +55,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch
|
||||
|
@ -282,15 +283,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/4.9/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
|
@ -298,7 +294,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p300"
|
||||
editKernelLocalversion "-dos.p297"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -75,6 +75,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p76"
|
||||
editKernelLocalversion "-dos.p77"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -122,6 +122,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.14/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-29581/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.14/0006.patch
|
||||
editKernelLocalversion "-dos.p123"
|
||||
editKernelLocalversion "-dos.p124"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -75,5 +75,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p75"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
editKernelLocalversion "-dos.p76"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -57,6 +57,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16120/^5.7/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.19/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374-alt/^5.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374-alt/^5.8/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36516/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
|
||||
|
@ -101,6 +103,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/4.19/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.19/0004.patch
|
||||
|
@ -112,6 +115,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23041/4.19/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.19/0003.patch
|
||||
|
@ -121,6 +125,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-29581/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.19/0005.patch
|
||||
editKernelLocalversion "-dos.p122"
|
||||
editKernelLocalversion "-dos.p127"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -101,6 +101,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p102"
|
||||
editKernelLocalversion "-dos.p103"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -81,6 +81,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p82"
|
||||
editKernelLocalversion "-dos.p83"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -55,7 +55,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch
|
||||
|
@ -318,7 +319,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p320"
|
||||
editKernelLocalversion "-dos.p322"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -51,7 +51,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.14/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch
|
||||
|
@ -333,10 +334,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.14/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-29581/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p338"
|
||||
editKernelLocalversion "-dos.p340"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -42,8 +42,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.19/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.19/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.19/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
|
||||
|
@ -181,6 +182,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.19/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374-alt/^5.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374-alt/^5.8/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0013.patch
|
||||
|
@ -375,6 +378,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/4.19/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20008/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch
|
||||
|
@ -405,9 +409,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-29581/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
editKernelLocalversion "-dos.p409"
|
||||
editKernelLocalversion "-dos.p414"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -54,6 +54,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1974/5.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/5.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/^5.17/0002.patch
|
||||
|
@ -62,6 +63,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/^5.17/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23041/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25636/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26490/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/5.4/0007.patch
|
||||
|
@ -74,5 +76,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28893/5.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-29581/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/5.4/0007.patch
|
||||
editKernelLocalversion "-dos.p74"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
editKernelLocalversion "-dos.p77"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -78,6 +78,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p79"
|
||||
editKernelLocalversion "-dos.p80"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -71,5 +71,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p71"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
editKernelLocalversion "-dos.p72"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -82,6 +82,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p83"
|
||||
editKernelLocalversion "-dos.p84"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -53,7 +53,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2284/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10565/ANY/0002.patch
|
||||
|
@ -322,7 +323,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p324"
|
||||
editKernelLocalversion "-dos.p326"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -72,5 +72,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p72"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
editKernelLocalversion "-dos.p73"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -49,7 +49,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.14/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch
|
||||
|
@ -371,9 +372,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.14/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-29581/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p375"
|
||||
editKernelLocalversion "-dos.p377"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -43,8 +43,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.19/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.19/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.19/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch
|
||||
|
@ -184,6 +185,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.19/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374-alt/^5.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374-alt/^5.8/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0013.patch
|
||||
|
@ -395,6 +398,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/4.19/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20008/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch
|
||||
|
@ -425,11 +429,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-29581/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
editKernelLocalversion "-dos.p431"
|
||||
editKernelLocalversion "-dos.p436"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -116,6 +116,7 @@ patchWorkspace() {
|
|||
|
||||
source build/envsetup.sh;
|
||||
repopick -i 330448; #tools: Let adb secure check depend on "==0" rather than "!=1"
|
||||
#repopick -it S_asb_2022-07;
|
||||
|
||||
sh "$DOS_SCRIPTS/Patch.sh";
|
||||
sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue