mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-12-25 07:29:24 -05:00
Update CVE patchers
This commit is contained in:
parent
26cda44016
commit
9c691d02ab
@ -1 +1 @@
|
||||
Subproject commit bb03bb4bbb177b6aa0a668e3b523ddbfcc55221a
|
||||
Subproject commit 4438e071d7b034ff691ce6e25b4bec09020b7f40
|
@ -658,7 +658,7 @@ hardenDefconfig() {
|
||||
|
||||
#Enable supported options
|
||||
#Disabled: DEBUG_SG (bootloops - https://patchwork.kernel.org/patch/8989981)
|
||||
declare -a optionsYes=("ARM64_PTR_AUTH" "ARM64_SW_TTBR0_PAN" "ARM64_UAO" "ASYMMETRIC_KEY_TYPE" "ASYMMETRIC_PUBLIC_KEY_SUBTYPE" "BUG" "BUG_ON_DATA_CORRUPTION" "CC_STACKPROTECTOR" "CC_STACKPROTECTOR_STRONG" "CPU_SW_DOMAIN_PAN" "DEBUG_CREDENTIALS" "DEBUG_KERNEL" "DEBUG_LIST" "DEBUG_NOTIFIERS" "DEBUG_RODATA" "DEBUG_SET_MODULE_RONX" "DEBUG_VIRTUAL" "DEBUG_WX" "FORTIFY_SOURCE" "HARDEN_BRANCH_PREDICTOR" "HARDENED_USERCOPY" "HARDEN_EL2_VECTORS" "INIT_ON_ALLOC_DEFAULT_ON" "INIT_ON_FREE_DEFAULT_ON" "INIT_STACK_ALL" "IO_STRICT_DEVMEM" "IPV6_PRIVACY" "KAISER" "KGSL_PER_PROCESS_PAGE_TABLE" "LEGACY_VSYSCALL_NONE" "MMC_SECDISCARD" "PAGE_POISONING" "PAGE_POISONING_NO_SANITY" "PAGE_POISONING_ZERO" "PAGE_TABLE_ISOLATION" "PANIC_ON_OOPS" "PKCS7_MESSAGE_PARSER" "RANDOMIZE_BASE" "RANDOMIZE_MEMORY" "REFCOUNT_FULL" "RETPOLINE" "RODATA_FULL_DEFAULT_ENABLED" "SCHED_STACK_END_CHECK" "SECCOMP" "SECCOMP_FILTER" "SECURITY" "SECURITY_DMESG_RESTRICT" "SECURITY_PERF_EVENTS_RESTRICT" "SECURITY_YAMA" "SECURITY_YAMA_STACKED" "SHUFFLE_PAGE_ALLOCATOR" "SLAB_FREELIST_HARDENED" "SLAB_FREELIST_RANDOM" "SLAB_HARDENED" "SLUB_DEBUG" "SLUB_HARDENED" "STACKPROTECTOR" "STACKPROTECTOR_PER_TASK" "STACKPROTECTOR_STRONG" "STATIC_USERMODEHELPER" "STRICT_DEVMEM" "STRICT_KERNEL_RWX" "STRICT_MEMORY_RWX" "STRICT_MODULE_RWX" "SYN_COOKIES" "SYSTEM_TRUSTED_KEYRING" "THREAD_INFO_IN_TASK" "UNMAP_KERNEL_AT_EL0" "VMAP_STACK" "X509_CERTIFICATE_PARSER");
|
||||
declare -a optionsYes=("ARM64_PTR_AUTH" "ARM64_SW_TTBR0_PAN" "ARM64_UAO" "ASYMMETRIC_KEY_TYPE" "ASYMMETRIC_PUBLIC_KEY_SUBTYPE" "BUG" "BUG_ON_DATA_CORRUPTION" "CC_STACKPROTECTOR" "CC_STACKPROTECTOR_STRONG" "CPU_SW_DOMAIN_PAN" "DEBUG_CREDENTIALS" "DEBUG_KERNEL" "DEBUG_LIST" "DEBUG_NOTIFIERS" "DEBUG_RODATA" "DEBUG_SET_MODULE_RONX" "DEBUG_VIRTUAL" "DEBUG_WX" "FORTIFY_SOURCE" "HARDEN_BRANCH_PREDICTOR" "HARDENED_USERCOPY" "HARDEN_EL2_VECTORS" "INIT_ON_ALLOC_DEFAULT_ON" "INIT_ON_FREE_DEFAULT_ON" "INIT_STACK_ALL" "INIT_STACK_ALL_ZERO" "IO_STRICT_DEVMEM" "IPV6_PRIVACY" "KAISER" "KGSL_PER_PROCESS_PAGE_TABLE" "LEGACY_VSYSCALL_NONE" "MMC_SECDISCARD" "PAGE_POISONING" "PAGE_POISONING_NO_SANITY" "PAGE_POISONING_ZERO" "PAGE_TABLE_ISOLATION" "PANIC_ON_OOPS" "PKCS7_MESSAGE_PARSER" "RANDOMIZE_BASE" "RANDOMIZE_MEMORY" "REFCOUNT_FULL" "RETPOLINE" "RODATA_FULL_DEFAULT_ENABLED" "SCHED_STACK_END_CHECK" "SECCOMP" "SECCOMP_FILTER" "SECURITY" "SECURITY_DMESG_RESTRICT" "SECURITY_PERF_EVENTS_RESTRICT" "SECURITY_YAMA" "SECURITY_YAMA_STACKED" "SHUFFLE_PAGE_ALLOCATOR" "SLAB_FREELIST_HARDENED" "SLAB_FREELIST_RANDOM" "SLAB_HARDENED" "SLUB_DEBUG" "SLUB_HARDENED" "STACKPROTECTOR" "STACKPROTECTOR_PER_TASK" "STACKPROTECTOR_STRONG" "STATIC_USERMODEHELPER" "STRICT_DEVMEM" "STRICT_KERNEL_RWX" "STRICT_MEMORY_RWX" "STRICT_MODULE_RWX" "SYN_COOKIES" "SYSTEM_TRUSTED_KEYRING" "THREAD_INFO_IN_TASK" "UNMAP_KERNEL_AT_EL0" "VMAP_STACK" "X509_CERTIFICATE_PARSER");
|
||||
#optionsYes+="GCC_PLUGINS" "GCC_PLUGIN_LATENT_ENTROPY" "GCC_PLUGIN_RANDSTRUCT" "GCC_PLUGIN_STRUCTLEAK" "GCC_PLUGIN_STRUCTLEAK_BYREF_ALL");
|
||||
optionsYes+=("PAGE_SANITIZE" "PAGE_SANITIZE_VERIFY" "SLAB_CANARY" "SLAB_SANITIZE" "SLAB_SANITIZE_VERIFY");
|
||||
#if [ "$DOS_DEBLOBBER_REPLACE_TIME" = true ]; then optionsYes+=("RTC_DRV_MSM" "RTC_DRV_PM8XXX" "RTC_DRV_MSM7X00A" "RTC_DRV_QPNP"); fi;
|
||||
|
@ -20,6 +20,7 @@
|
||||
type='rsa'; #Options: rsa, ec
|
||||
|
||||
#source build/envsetup.sh && breakfast lineage_sailfish-user && make -j20 generate_verity_key;
|
||||
#source ../../Scripts/Generate_Signing_Keys.sh $device;
|
||||
|
||||
cd "$DOS_SIGNING_KEYS/NEW";
|
||||
mkdir $1; cd $1;
|
||||
|
@ -442,9 +442,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p446"
|
||||
editKernelLocalversion "-dos.p447"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -421,7 +421,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p423"
|
||||
editKernelLocalversion "-dos.p424"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -423,10 +423,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p428"
|
||||
editKernelLocalversion "-dos.p429"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -251,7 +251,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p253"
|
||||
editKernelLocalversion "-dos.p254"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -222,8 +222,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p225"
|
||||
editKernelLocalversion "-dos.p226"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -247,9 +247,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p251"
|
||||
editKernelLocalversion "-dos.p252"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -402,7 +402,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p404"
|
||||
editKernelLocalversion "-dos.p405"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -339,7 +339,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p341"
|
||||
editKernelLocalversion "-dos.p342"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -502,6 +502,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -522,6 +523,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/^5.7/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch
|
||||
@ -542,6 +545,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch
|
||||
@ -553,12 +557,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
@ -567,5 +572,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7542/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p567"
|
||||
editKernelLocalversion "-dos.p572"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -296,6 +296,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.18/0004.patch
|
||||
@ -604,6 +605,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -646,6 +648,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -659,12 +662,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
@ -677,5 +681,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7542/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p677"
|
||||
editKernelLocalversion "-dos.p681"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -340,11 +340,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p346"
|
||||
editKernelLocalversion "-dos.p347"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -265,9 +265,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p269"
|
||||
editKernelLocalversion "-dos.p270"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -256,6 +256,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p257"
|
||||
editKernelLocalversion "-dos.p258"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -342,9 +342,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p346"
|
||||
editKernelLocalversion "-dos.p347"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -402,9 +402,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p406"
|
||||
editKernelLocalversion "-dos.p407"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -400,9 +400,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p404"
|
||||
editKernelLocalversion "-dos.p405"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -265,6 +265,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p266"
|
||||
editKernelLocalversion "-dos.p267"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -320,9 +320,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p324"
|
||||
editKernelLocalversion "-dos.p325"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -303,10 +303,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p308"
|
||||
editKernelLocalversion "-dos.p309"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -221,6 +221,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p222"
|
||||
editKernelLocalversion "-dos.p223"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -412,9 +412,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p416"
|
||||
editKernelLocalversion "-dos.p417"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -520,6 +520,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -563,6 +564,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -576,19 +578,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p590"
|
||||
editKernelLocalversion "-dos.p594"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -361,10 +361,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p366"
|
||||
editKernelLocalversion "-dos.p367"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -292,8 +292,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p295"
|
||||
editKernelLocalversion "-dos.p296"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -345,8 +345,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p348"
|
||||
editKernelLocalversion "-dos.p349"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -419,7 +419,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p421"
|
||||
editKernelLocalversion "-dos.p422"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -281,6 +281,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.18/0004.patch
|
||||
@ -586,6 +587,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -628,6 +630,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -641,12 +644,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
@ -660,5 +664,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7542/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p660"
|
||||
editKernelLocalversion "-dos.p664"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -231,7 +231,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p233"
|
||||
editKernelLocalversion "-dos.p234"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -294,6 +294,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p295"
|
||||
editKernelLocalversion "-dos.p296"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -225,7 +225,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p227"
|
||||
editKernelLocalversion "-dos.p228"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -464,6 +464,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -507,6 +508,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -520,18 +522,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p533"
|
||||
editKernelLocalversion "-dos.p537"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -105,7 +105,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p107"
|
||||
editKernelLocalversion "-dos.p108"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -191,8 +191,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p194"
|
||||
editKernelLocalversion "-dos.p195"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -202,7 +202,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p204"
|
||||
editKernelLocalversion "-dos.p205"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -106,6 +106,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p107"
|
||||
editKernelLocalversion "-dos.p108"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -173,9 +173,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p177"
|
||||
editKernelLocalversion "-dos.p178"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -168,9 +168,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p172"
|
||||
editKernelLocalversion "-dos.p173"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -492,6 +492,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -533,6 +534,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -546,16 +548,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p557"
|
||||
editKernelLocalversion "-dos.p560"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -253,6 +253,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.18/0004.patch
|
||||
@ -559,6 +560,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -601,6 +603,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -614,12 +617,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
@ -629,5 +633,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p629"
|
||||
editKernelLocalversion "-dos.p633"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -388,9 +388,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p392"
|
||||
editKernelLocalversion "-dos.p393"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -220,8 +220,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p223"
|
||||
editKernelLocalversion "-dos.p224"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -216,8 +216,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p219"
|
||||
editKernelLocalversion "-dos.p220"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -243,6 +243,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p244"
|
||||
editKernelLocalversion "-dos.p245"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -247,7 +247,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.4/0006.patch
|
||||
@ -257,6 +259,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch
|
||||
@ -288,6 +291,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.4/0007.patch
|
||||
@ -335,13 +341,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27786/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
editKernelLocalversion "-dos.p343"
|
||||
editKernelLocalversion "-dos.p351"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -302,7 +302,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p304"
|
||||
editKernelLocalversion "-dos.p305"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -444,6 +444,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -465,6 +466,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/^5.7/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch
|
||||
@ -485,6 +488,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch
|
||||
@ -496,12 +500,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch
|
||||
@ -510,5 +515,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7542/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p510"
|
||||
editKernelLocalversion "-dos.p515"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -403,6 +403,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -447,6 +448,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -460,16 +462,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p471"
|
||||
editKernelLocalversion "-dos.p475"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -241,10 +241,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p246"
|
||||
editKernelLocalversion "-dos.p247"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -414,6 +414,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.4/0006.patch
|
||||
@ -423,6 +424,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch
|
||||
@ -451,6 +453,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.4/0004.patch
|
||||
@ -499,8 +504,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch
|
||||
editKernelLocalversion "-dos.p502"
|
||||
editKernelLocalversion "-dos.p509"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -288,8 +288,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p291"
|
||||
editKernelLocalversion "-dos.p292"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -237,9 +237,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p241"
|
||||
editKernelLocalversion "-dos.p242"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -258,6 +258,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p259"
|
||||
editKernelLocalversion "-dos.p260"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -357,10 +357,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p362"
|
||||
editKernelLocalversion "-dos.p363"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -322,8 +322,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p325"
|
||||
editKernelLocalversion "-dos.p326"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -313,8 +313,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p316"
|
||||
editKernelLocalversion "-dos.p317"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -267,6 +267,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p268"
|
||||
editKernelLocalversion "-dos.p269"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -342,9 +342,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p346"
|
||||
editKernelLocalversion "-dos.p347"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -181,10 +181,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p186"
|
||||
editKernelLocalversion "-dos.p187"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -207,6 +207,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p208"
|
||||
editKernelLocalversion "-dos.p209"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -113,6 +113,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15814/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15846/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15851/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch
|
||||
@ -341,6 +342,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
@ -389,6 +391,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -403,13 +406,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p411"
|
||||
editKernelLocalversion "-dos.p415"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -161,10 +161,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p166"
|
||||
editKernelLocalversion "-dos.p167"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -281,7 +281,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p283"
|
||||
editKernelLocalversion "-dos.p284"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -128,6 +128,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/^4.13.6/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15842/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15843/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15853/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.18/0004.patch
|
||||
@ -441,6 +442,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -487,6 +489,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -500,13 +503,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p508"
|
||||
editKernelLocalversion "-dos.p512"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -231,7 +231,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p233"
|
||||
editKernelLocalversion "-dos.p234"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -203,7 +203,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p205"
|
||||
editKernelLocalversion "-dos.p206"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -382,6 +382,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -428,6 +429,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -441,13 +443,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p449"
|
||||
editKernelLocalversion "-dos.p453"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -340,6 +340,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.4/0006.patch
|
||||
@ -349,6 +350,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch
|
||||
@ -378,6 +380,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.4/0004.patch
|
||||
@ -426,8 +431,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch
|
||||
editKernelLocalversion "-dos.p429"
|
||||
editKernelLocalversion "-dos.p435"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -372,7 +372,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch
|
||||
@ -385,6 +387,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch
|
||||
@ -408,6 +411,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch
|
||||
@ -463,9 +469,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10853/4.9/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||
editKernelLocalversion "-dos.p467"
|
||||
editKernelLocalversion "-dos.p475"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -239,6 +239,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p240"
|
||||
editKernelLocalversion "-dos.p241"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -106,6 +106,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p107"
|
||||
editKernelLocalversion "-dos.p108"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -173,9 +173,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p177"
|
||||
editKernelLocalversion "-dos.p178"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -234,6 +234,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch
|
||||
@ -246,6 +248,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/ANY/0001.patch
|
||||
@ -266,6 +269,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.9/0008.patch
|
||||
@ -319,12 +325,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27786/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||
editKernelLocalversion "-dos.p326"
|
||||
editKernelLocalversion "-dos.p335"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -369,7 +369,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch
|
||||
@ -382,6 +384,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch
|
||||
@ -405,6 +408,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch
|
||||
@ -460,9 +466,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10853/4.9/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||
editKernelLocalversion "-dos.p464"
|
||||
editKernelLocalversion "-dos.p472"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -409,6 +409,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
@ -456,6 +457,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -469,13 +471,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p477"
|
||||
editKernelLocalversion "-dos.p481"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -387,9 +387,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p391"
|
||||
editKernelLocalversion "-dos.p392"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -86,6 +86,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch
|
||||
@ -181,6 +182,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
@ -224,6 +226,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -238,13 +241,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27675/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p246"
|
||||
editKernelLocalversion "-dos.p251"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -213,8 +213,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p216"
|
||||
editKernelLocalversion "-dos.p217"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -175,6 +175,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p176"
|
||||
editKernelLocalversion "-dos.p177"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -91,11 +91,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch
|
||||
editKernelLocalversion "-dos.p97"
|
||||
editKernelLocalversion "-dos.p98"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -283,7 +283,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p285"
|
||||
editKernelLocalversion "-dos.p286"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -212,7 +212,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.4/0006.patch
|
||||
@ -222,6 +224,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch
|
||||
@ -249,6 +252,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/4.4/0004.patch
|
||||
@ -300,9 +306,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13096/^4.17.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch
|
||||
editKernelLocalversion "-dos.p304"
|
||||
editKernelLocalversion "-dos.p311"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -285,7 +285,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch
|
||||
@ -298,6 +300,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch
|
||||
@ -323,6 +326,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch
|
||||
@ -382,8 +388,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||
editKernelLocalversion "-dos.p385"
|
||||
editKernelLocalversion "-dos.p393"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -259,7 +259,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.9/0007.patch
|
||||
@ -272,6 +274,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.9/0008.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch
|
||||
@ -298,6 +301,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8428/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.9/0008.patch
|
||||
@ -357,8 +363,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||
editKernelLocalversion "-dos.p360"
|
||||
editKernelLocalversion "-dos.p368"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -117,6 +117,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
@ -253,6 +254,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
@ -301,6 +303,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -315,16 +318,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27675/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p326"
|
||||
editKernelLocalversion "-dos.p331"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -239,10 +239,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p244"
|
||||
editKernelLocalversion "-dos.p245"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -244,6 +244,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19535/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/4.4/0006.patch
|
||||
@ -253,6 +255,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/ANY/0001.patch
|
||||
@ -282,6 +285,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.4/0007.patch
|
||||
@ -334,8 +340,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.4/0007.patch
|
||||
editKernelLocalversion "-dos.p337"
|
||||
editKernelLocalversion "-dos.p344"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -288,8 +288,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p291"
|
||||
editKernelLocalversion "-dos.p292"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -256,6 +256,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p257"
|
||||
editKernelLocalversion "-dos.p258"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -198,6 +198,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p199"
|
||||
editKernelLocalversion "-dos.p200"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -341,9 +341,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p345"
|
||||
editKernelLocalversion "-dos.p346"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -238,8 +238,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p241"
|
||||
editKernelLocalversion "-dos.p242"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -200,6 +200,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p201"
|
||||
editKernelLocalversion "-dos.p202"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -154,10 +154,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p159"
|
||||
editKernelLocalversion "-dos.p160"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -281,7 +281,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p283"
|
||||
editKernelLocalversion "-dos.p284"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -101,6 +101,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/^4.8.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15853/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/^4.13.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16912/3.18/0003.patch
|
||||
@ -298,6 +299,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
@ -346,6 +348,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
@ -360,13 +363,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p368"
|
||||
editKernelLocalversion "-dos.p372"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -229,7 +229,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p231"
|
||||
editKernelLocalversion "-dos.p232"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -185,7 +185,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/^5.7.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/^5.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p187"
|
||||
editKernelLocalversion "-dos.p188"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user