mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-05-02 06:26:20 -04:00
Update CVE patchers [the big fixup]
This removes many duplicately or wrongly applied patches. Correctly removed: - CVE-2011-4132 can apply infinitely - CVE-2013-2891 can apply infinitely - CVE-2014-9781 can apply once to fb_cmap_to_user correctly and incorrectly to fb_copy_cmap - CVE-2015-0571 can apply incorrectly and was disabled in patch repo as a result - CVE-2016-2475 can apply infinitely - CVE-2017-0627 can apply infinitely - CVE-2017-0750 can apply infinitely - CVE-2017-14875 can apply infinitely - CVE-2017-14883 can apply infinitely - CVE-2020-11146 can apply infinitely - CVE-2020-11608 can apply infinitely - CVE-2021-42008 can apply infinitely Questionable (might actually be beneficial to "incorrectly" apply again): - CVE-2012-6544 can apply once to hci_sock_getsockopt correctly and incorrectly to hci_sock_setsockopt - CVE-2013-2898 can apply once to sensor_hub_get_feature correctly and incorrectly to sensor_hub_set_feature - CVE-2015-8575 can apply once to sco_sock_bind correctly and incorrectly to sco_sock_connect - CVE-2017-8281 can apply once to diagchar_ioctl correctly and incorrectly to diagchar_compat_ioctl - CVE-2019-10622 can apply once to qdsp_cvp_callback correctly and incorrectly to qdsp_cvs_callback - CVE-2019-14104 can apply once to cam_context_handle_start/stop_dev and incorrectly to cam_context_handle_crm_process_evt and cam_context_handle_flush_dev Other notes: - CVE-2016-6693 can be applied again if it was already applied in combination with CVE-2016-6696 then the dupe check will fail and mark CVE-2016-6696 as already applied, effectively reverting it. This was seemingly fixed with a hand merged patch in patch repo. Wrongly removed: - CVE-2013-2147 is meant for cciss_ioctl32_passthru but is detected in cciss_ioctl32_big_passthru - CVE-2015-8746 is meant for nfs_v4_2_minor_ops but is detected in nfs_v4_1_minor_ops - CVE-2021-Misc2/ANY/0043.patch is meant for WLANTL_RxCachedFrames but is detected in WLANTL_RxFrames Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
parent
927b9bfbc5
commit
ac1e89f0c8
82 changed files with 158 additions and 677 deletions
|
@ -47,7 +47,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6542/3.4/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch
|
||||
|
@ -92,7 +91,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2140/3.4/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2141/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2146/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2147/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2148/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2164/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2206/3.4/0002.patch
|
||||
|
@ -225,7 +223,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9731/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9876/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9880/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/3.4/0002.patch
|
||||
|
@ -262,7 +259,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0013.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.4/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch
|
||||
|
@ -730,6 +726,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30262/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0049.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch
|
||||
|
@ -745,5 +742,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
editKernelLocalversion "-dos.p745"
|
||||
editKernelLocalversion "-dos.p742"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -12,7 +12,6 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00
|
|||
#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
|
||||
|
@ -35,7 +34,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7509/3.4/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch
|
||||
|
@ -88,8 +86,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0633/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/3.4/0002.patch
|
||||
|
@ -401,6 +397,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch
|
||||
|
@ -409,5 +406,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0061.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0062.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
editKernelLocalversion "-dos.p409"
|
||||
editKernelLocalversion "-dos.p406"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -15,7 +15,6 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/^3.6/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch
|
||||
|
@ -43,7 +42,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch
|
||||
|
@ -98,8 +96,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0524/3.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0794/3.4/0003.patch
|
||||
|
@ -415,6 +411,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch
|
||||
|
@ -446,5 +443,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0046.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
editKernelLocalversion "-dos.p446"
|
||||
editKernelLocalversion "-dos.p443"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -22,13 +22,10 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00
|
|||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9903/^3.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/^3.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch
|
||||
|
@ -95,8 +92,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
|
||||
|
@ -120,8 +115,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0445/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0621/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0004.patch
|
||||
|
@ -159,7 +152,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.10/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.10/0002.patch
|
||||
|
@ -433,8 +425,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch
|
||||
|
@ -493,11 +483,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p499"
|
||||
editKernelLocalversion "-dos.p490"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -23,14 +23,11 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00
|
|||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0004.patch
|
||||
|
@ -115,8 +112,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5829/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch
|
||||
|
@ -145,8 +140,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0523/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/ANY/0001.patch
|
||||
|
@ -514,8 +507,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch
|
||||
|
@ -574,11 +565,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p580"
|
||||
editKernelLocalversion "-dos.p572"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -23,14 +23,11 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00
|
|||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2891/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2898/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10.3/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/^4.3.3/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9940/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0573/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch
|
||||
|
@ -92,8 +89,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6676/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch
|
||||
|
@ -148,8 +143,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0606/ANY/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0611/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0631/ANY/0001.patch
|
||||
|
@ -157,7 +150,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0746/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0748/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0751/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch
|
||||
|
@ -554,8 +546,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch
|
||||
|
@ -615,8 +605,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p618"
|
||||
editKernelLocalversion "-dos.p609"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -11,7 +11,6 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00
|
|||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch
|
||||
|
@ -32,7 +31,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch
|
||||
|
@ -43,8 +41,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.4/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.4/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.4/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3135/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.4/0002.patch
|
||||
|
@ -71,8 +67,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2636/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch
|
||||
|
@ -197,6 +191,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0061.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0062.patch
|
||||
|
@ -204,5 +199,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0071.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0072.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
editKernelLocalversion "-dos.p204"
|
||||
editKernelLocalversion "-dos.p199"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -11,7 +11,6 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00
|
|||
#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-1957/^3.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
|
||||
|
@ -35,7 +34,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7509/3.4/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch
|
||||
|
@ -74,8 +72,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0403/3.0-^3.18/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0404/^3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.4/0005.patch
|
||||
|
@ -316,6 +312,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch
|
||||
|
@ -323,5 +320,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0061.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0062.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
editKernelLocalversion "-dos.p323"
|
||||
editKernelLocalversion "-dos.p320"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -7,8 +7,6 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00
|
|||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-4131/^3.2/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-4132/3.0/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-4132/^3.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-4347/^3.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-4347/^3.2/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-5327/^3.1/0001.patch
|
||||
|
@ -16,7 +14,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-5327/^3.1/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2375/^3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3375/^3.2.24/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.0/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2899/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4299/3.4/0003.patch
|
||||
|
@ -96,7 +93,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch
|
||||
|
@ -382,9 +378,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
editKernelLocalversion "-dos.p386"
|
||||
editKernelLocalversion "-dos.p383"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -7,8 +7,6 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00
|
|||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-4131/^3.2/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-4132/3.0/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-4132/^3.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-4347/^3.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-4347/^3.2/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-5327/^3.1/0001.patch
|
||||
|
@ -16,7 +14,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2011-5327/^3.1/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2375/^3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-3375/^3.2.24/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.0/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6545/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2899/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4299/3.4/0003.patch
|
||||
|
@ -93,7 +90,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch
|
||||
|
@ -376,9 +372,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
editKernelLocalversion "-dos.p380"
|
||||
editKernelLocalversion "-dos.p377"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -89,7 +89,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/^4.3/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8660/^4.3.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8839/ANY/0017.patch
|
||||
|
@ -186,7 +185,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0523/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0749/ANY/0001.patch
|
||||
|
@ -579,7 +577,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch
|
||||
|
@ -680,6 +677,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch
|
||||
|
@ -692,5 +690,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.18/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p692"
|
||||
editKernelLocalversion "-dos.p690"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue