From b5c8ef6bc3c4a61eec1d79bbc251bb85a88bea55 Mon Sep 17 00:00:00 2001 From: Tad Date: Fri, 8 Dec 2017 18:59:55 -0500 Subject: [PATCH] Update CVE patchers --- Misc/BE.txt | 11 - Patches/Linux | 2 +- Scripts/LineageOS-14.1/00init.sh | 3 +- .../android_kernel_amazon_hdx-common.sh | 165 ++++----- .../android_kernel_asus_msm8916.sh | 82 ++--- .../android_kernel_fairphone_msm8974.sh | 53 +-- .../android_kernel_google_marlin.sh | 338 ++++++++--------- .../CVE_Patchers/android_kernel_google_msm.sh | 80 ++-- .../android_kernel_htc_flounder.sh | 126 +++---- .../android_kernel_htc_msm8974.sh | 45 +-- .../android_kernel_htc_msm8994.sh | 346 +++++++++--------- .../android_kernel_huawei_angler.sh | 216 +++++------ .../android_kernel_lge_bullhead.sh | 202 +++++----- .../android_kernel_lge_hammerhead.sh | 76 ++-- .../CVE_Patchers/android_kernel_lge_mako.sh | 30 +- .../CVE_Patchers/android_kernel_moto_shamu.sh | 192 +++++----- .../android_kernel_motorola_msm8916.sh | 156 ++++---- .../android_kernel_motorola_msm8992.sh | 308 ++++++++-------- .../android_kernel_nextbit_msm8992.sh | 90 ++--- .../android_kernel_oneplus_msm8974.sh | 85 ++--- .../CVE_Patchers/android_kernel_samsung_jf.sh | 95 ++--- .../android_kernel_samsung_msm8974.sh | 39 +- .../android_kernel_samsung_smdk4412.sh | 84 ++--- .../android_kernel_samsung_universal8890.sh | 256 ++++++------- 24 files changed, 1538 insertions(+), 1542 deletions(-) delete mode 100644 Misc/BE.txt diff --git a/Misc/BE.txt b/Misc/BE.txt deleted file mode 100644 index 316e91f7..00000000 --- a/Misc/BE.txt +++ /dev/null @@ -1,11 +0,0 @@ -marlin -../../../../../../kernel/google/marlin/mm/mmap.c:95:29: error: expected '=', ',', ';', 'asm' or '__attribute__' before '__ro_after_init' - pgprot_t protection_map[16] __ro_after_init = { - -osprey -../../../../../../kernel/motorola/msm8916/drivers/net/wireless/wcnss/wcnss_wlan.c: In function 'wcnss_wlan_macaddr_store': -../../../../../../kernel/motorola/msm8916/drivers/net/wireless/wcnss/wcnss_wlan.c:442:4: warning: format '%hhx' expects argument of type 'unsigned char *', but argument 3 has type 'int *' [-Wformat=] -error, forbidden warning: wcnss_wlan.c:442 -make[5]: *** [/mnt/Drive-1/Development/Other/Android_ROMs/Build/LineageOS-14.1/kernel/motorola/msm8916/scripts/Makefile.build:308: drivers/net/wireless/wcnss/wcnss_wlan.o] Error 1 -make[5]: *** Waiting for unfinished jobs.... - diff --git a/Patches/Linux b/Patches/Linux index 7996bfa9..0c64f077 160000 --- a/Patches/Linux +++ b/Patches/Linux @@ -1 +1 @@ -Subproject commit 7996bfa9e4e78e4631d98d78435243113a0f69cc +Subproject commit 0c64f07799a239c862b332602e878edb22d57ddf diff --git a/Scripts/LineageOS-14.1/00init.sh b/Scripts/LineageOS-14.1/00init.sh index df56c75a..d65a0bdc 100644 --- a/Scripts/LineageOS-14.1/00init.sh +++ b/Scripts/LineageOS-14.1/00init.sh @@ -24,7 +24,8 @@ export base=$androidWorkspace"Build/LineageOS-14.1/"; #export OTA_PACKAGE_SIGNING_KEY=$SIGNING_KEY_DIR"/releasekey" export patches=$androidWorkspace"Patches/LineageOS-14.1/"; -export cvePatches=$androidWorkspace"Patches/Linux/"; +export cvePatchesLinux=$androidWorkspace"Patches/Linux/"; +export cvePatchesAndroid=$androidWorkspace"Patches/Android/"; export dosWallpapers=$androidWorkspace"Patches/Wallpapers/"; export scripts=$androidWorkspace"Scripts/LineageOS-14.1/"; diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh index 3db0652a..ae638f00 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh @@ -1,84 +1,85 @@ #!/bin/bash -cd $base"kernel/amazon/hdx-common" -git apply $cvePatches/CVE-2012-6704/^3.5/0001.patch -git apply $cvePatches/CVE-2014-1739/ANY/0001.patch -git apply $cvePatches/CVE-2014-3153/ANY/0002.patch -git apply $cvePatches/CVE-2014-3153/ANY/0004.patch -git apply $cvePatches/CVE-2014-4656/ANY/0001.patch -git apply $cvePatches/CVE-2014-7822/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2014-8709/ANY/0001.patch -git apply $cvePatches/CVE-2014-9420/ANY/0001.patch -git apply $cvePatches/CVE-2014-9781/ANY/0001.patch -git apply $cvePatches/CVE-2014-9880/ANY/0001.patch -git apply $cvePatches/CVE-2015-1593/ANY/0001.patch -git apply $cvePatches/CVE-2015-6640/ANY/0001.patch -git apply $cvePatches/CVE-2016-10230/ANY/0001.patch -git apply $cvePatches/CVE-2016-2185/ANY/0001.patch -git apply $cvePatches/CVE-2016-2186/ANY/0001.patch -git apply $cvePatches/CVE-2016-2443/ANY/0001.patch -git apply $cvePatches/CVE-2016-2488/ANY/0001.patch -git apply $cvePatches/CVE-2016-2544/ANY/0001.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0001.patch -git apply $cvePatches/CVE-2016-3892/ANY/0001.patch -git apply $cvePatches/CVE-2016-3893/ANY/0001.patch -git apply $cvePatches/CVE-2016-3894/ANY/0001.patch -git apply $cvePatches/CVE-2016-6672/ANY/0001.patch -git apply $cvePatches/CVE-2016-6751/ANY/0001.patch -git apply $cvePatches/CVE-2016-6753/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-8404/ANY/0001.patch -git apply $cvePatches/CVE-2016-8417/ANY/0001.patch -git apply $cvePatches/CVE-2016-8444/ANY/0001.patch -git apply $cvePatches/CVE-2016-8650/ANY/0001.patch -git apply $cvePatches/CVE-2016-9576/3.4/0001.patch -git apply $cvePatches/CVE-2016-9604/ANY/0001.patch -git apply $cvePatches/CVE-2016-9793/ANY/0001.patch -git apply $cvePatches/CVE-2016-9794/ANY/0001.patch -git apply $cvePatches/CVE-2017-0403/3.0-^3.18/0001.patch -git apply $cvePatches/CVE-2017-0404/^3.18/0001.patch -git apply $cvePatches/CVE-2017-0524/ANY/0001.patch -git apply $cvePatches/CVE-2017-0611/3.4/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0710/ANY/0001.patch -git apply $cvePatches/CVE-2017-0751/ANY/0001.patch -git apply $cvePatches/CVE-2017-0786/ANY/0001.patch -git apply $cvePatches/CVE-2017-1000380/^4.11/0001.patch -git apply $cvePatches/CVE-2017-11000/ANY/0002.patch -git apply $cvePatches/CVE-2017-11059/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-13080/ANY/0001.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0001.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0002.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0003.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0004.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-2671/^4.10/0001.patch -git apply $cvePatches/CVE-2017-5970/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6074/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6951/^3.14/0001.patch -git apply $cvePatches/CVE-2017-7308/ANY/0003.patch -git apply $cvePatches/CVE-2017-7487/ANY/0001.patch -git apply $cvePatches/CVE-2017-7533/3.4/0001.patch -git apply $cvePatches/CVE-2017-8246/3.4/0002.patch -git apply $cvePatches/CVE-2017-8247/ANY/0001.patch -git apply $cvePatches/CVE-2017-8254/3.4/0001.patch -git apply $cvePatches/CVE-2017-8254/3.4/0002.patch -git apply $cvePatches/CVE-2017-8890/3.4/0001.patch -git apply $cvePatches/CVE-2017-9242/^4.11/0001.patch -git apply $cvePatches/CVE-2017-9684/ANY/0001.patch -git apply $cvePatches/CVE-2017-9706/ANY/0001.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/amazon/hdx-common" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2012-6704/^3.5/0001.patch +git apply $cvePatchesLinux/CVE-2014-1739/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-3153/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2014-3153/ANY/0004.patch +git apply $cvePatchesLinux/CVE-2014-4656/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-7822/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2014-8709/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9420/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9880/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10230/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2488/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3893/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8417/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8444/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9793/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9794/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0403/3.0-^3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-11000/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-11059/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-13080/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0004.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-5970/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch +git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch +git apply $cvePatchesLinux/CVE-2017-8890/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_msm8916.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_msm8916.sh index 813a9798..84b03279 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_msm8916.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_msm8916.sh @@ -1,43 +1,43 @@ #!/bin/bash -cd $base"kernel/asus/msm8916" -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0001-No_dir-relax.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0002.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0003.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0004.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0005.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0006.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0007.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0008.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0009.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0010.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0011.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0012.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0013.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0014.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0015.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0016.patch -git apply $cvePatches/CVE-2016-6672/ANY/0001.patch -git apply $cvePatches/CVE-2016-6693/ANY/0001.patch -git apply $cvePatches/CVE-2016-6696/ANY/0001.patch -git apply $cvePatches/CVE-2016-8394/ANY/0001.patch -git apply $cvePatches/CVE-2016-8481/ANY/0003.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-11600/3.10/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16531/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16643/3.5+/0001.patch -git apply $cvePatches/CVE-2017-16645/ANY/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0003.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-5972/ANY/0002.patch -git apply $cvePatches/LVT-2017-0003/3.10/0001.patch +cd $base"kernel/kernel/asus/msm8916" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0005.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0006.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0007.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0008.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0009.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0010.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0011.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0012.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0013.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0014.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0015.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8394/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8481/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch +git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch +git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh index 91aae5bd..f4b0f038 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh @@ -1,28 +1,29 @@ #!/bin/bash -cd $base"kernel/fairphone/msm8974" -git apply $cvePatches/CVE-2014-3153/ANY/0002.patch -git apply $cvePatches/CVE-2014-3153/ANY/0004.patch -git apply $cvePatches/CVE-2016-0774/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0786/ANY/0001.patch -git apply $cvePatches/CVE-2017-11059/ANY/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-13080/ANY/0001.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0001.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0002.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0003.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0004.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-7533/3.4/0001.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/fairphone/msm8974" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-3153/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2014-3153/ANY/0004.patch +git apply $cvePatchesLinux/CVE-2016-0774/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11059/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-13080/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0004.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_marlin.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_marlin.sh index a13dfa54..316462bb 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_marlin.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_marlin.sh @@ -1,171 +1,171 @@ #!/bin/bash -cd $base"kernel/google/marlin" -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0018.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0019.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0020.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0021.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0022.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0023.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0024.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0025.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0026.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0027.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0030.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0031.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0032.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0033.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0034.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0035.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0036.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0037.patch -#git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0038.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0039.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0040.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0041.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0042.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0043.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0044.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0045.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0049.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0050.patch -git apply $cvePatches/CVE-2014-9900/ANY/0001.patch -git apply $cvePatches/CVE-2015-2041/^3.19/0002.patch -git apply $cvePatches/CVE-2015-7515/^4.4/0002.patch -git apply $cvePatches/CVE-2015-8966/3.15+/0001.patch -git apply $cvePatches/CVE-2016-10088/ANY/0001.patch -git apply $cvePatches/CVE-2016-2187/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0002.patch -git apply $cvePatches/CVE-2016-2544/ANY/0001.patch -git apply $cvePatches/CVE-2016-2549/^4.4/0001.patch -git apply $cvePatches/CVE-2016-2847/ANY/0001.patch -git apply $cvePatches/CVE-2016-3136/ANY/0001.patch -git apply $cvePatches/CVE-2016-3137/ANY/0001.patch -git apply $cvePatches/CVE-2016-3140/ANY/0001.patch -git apply $cvePatches/CVE-2016-3156/ANY/0001.patch -git apply $cvePatches/CVE-2016-3672/ANY/0001.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0002.patch -git apply $cvePatches/CVE-2016-3906/ANY/0001.patch -git apply $cvePatches/CVE-2016-5342/ANY/0001.patch -git apply $cvePatches/CVE-2016-5345/ANY/0001.patch -git apply $cvePatches/CVE-2016-5854/ANY/0001.patch -git apply $cvePatches/CVE-2016-5856/ANY/0001.patch -git apply $cvePatches/CVE-2016-5857/ANY/0001.patch -git apply $cvePatches/CVE-2016-5858/ANY/0001.patch -git apply $cvePatches/CVE-2016-5867/3.18/0002.patch -git apply $cvePatches/CVE-2016-5870/ANY/0001.patch -git apply $cvePatches/CVE-2016-6672/ANY/0001.patch -git apply $cvePatches/CVE-2016-6693/ANY/0001.patch -git apply $cvePatches/CVE-2016-6694/ANY/0001.patch -git apply $cvePatches/CVE-2016-6695/ANY/0001.patch -git apply $cvePatches/CVE-2016-6696/ANY/0001.patch -git apply $cvePatches/CVE-2016-7042/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-8418/ANY/0001.patch -git apply $cvePatches/CVE-2016-8483/ANY/0001.patch -git apply $cvePatches/CVE-2016-9191/3.11-^4.8/0001.patch -git apply $cvePatches/CVE-2016-9604/ANY/0001.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0003.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0006.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0007.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0008.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0009.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0010.patch -git apply $cvePatches/CVE-2017-0510/3.18/0003.patch -git apply $cvePatches/CVE-2017-0524/ANY/0001.patch -git apply $cvePatches/CVE-2017-0537/ANY/0001.patch -git apply $cvePatches/CVE-2017-0610/ANY/0002.patch -git apply $cvePatches/CVE-2017-0622/3.18/0001.patch -git apply $cvePatches/CVE-2017-0627/ANY/0001.patch -git apply $cvePatches/CVE-2017-0749/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0866/3.18/0001.patch -git apply $cvePatches/CVE-2017-1000364/3.18/0008.patch -git apply $cvePatches/CVE-2017-1000364/3.18/0009.patch -git apply $cvePatches/CVE-2017-1000364/3.18/0010.patch -git apply $cvePatches/CVE-2017-1000365/3.18/0002.patch -git apply $cvePatches/CVE-2017-1000380/^4.11/0001.patch -git apply $cvePatches/CVE-2017-10998/3.18/0002.patch -git apply $cvePatches/CVE-2017-11001/ANY/0001.patch -git apply $cvePatches/CVE-2017-11002/ANY/0002.patch -git apply $cvePatches/CVE-2017-11013/qcacld-2.0/0002.patch -git apply $cvePatches/CVE-2017-11014/qcacld-2.0/0001.patch -git apply $cvePatches/CVE-2017-11015/qcacld-2.0/0003.patch -git apply $cvePatches/CVE-2017-11015/qcacld-2.0/0004.patch -git apply $cvePatches/CVE-2017-11016/ANY/0001.patch -git apply $cvePatches/CVE-2017-11019/ANY/0001.patch -git apply $cvePatches/CVE-2017-11025/ANY/0001.patch -git apply $cvePatches/CVE-2017-11028/3.18/0001.patch -git apply $cvePatches/CVE-2017-11030/3.18/0001.patch -git apply $cvePatches/CVE-2017-11031/ANY/0001.patch -git apply $cvePatches/CVE-2017-11032/ANY/0001.patch -git apply $cvePatches/CVE-2017-11033/3.18/0002.patch -git apply $cvePatches/CVE-2017-11044/ANY/0001.patch -git apply $cvePatches/CVE-2017-11045/ANY/0001.patch -git apply $cvePatches/CVE-2017-11046/ANY/0001.patch -git apply $cvePatches/CVE-2017-11049/ANY/0001.patch -git apply $cvePatches/CVE-2017-11057/ANY/0001.patch -git apply $cvePatches/CVE-2017-11067/ANY/0001.patch -git apply $cvePatches/CVE-2017-11089/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-11091/3.18/0001.patch -git apply $cvePatches/CVE-2017-11093/3.18/0001.patch -git apply $cvePatches/CVE-2017-12146/3.16+/0001.patch -git apply $cvePatches/CVE-2017-14897/ANY/0001.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-15868/ANY/0001.patch -git apply $cvePatches/CVE-2017-16525/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16530/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16531/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16643/3.5+/0001.patch -git apply $cvePatches/CVE-2017-16645/ANY/0001.patch -git apply $cvePatches/CVE-2017-16646/ANY/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0009.patch -git apply $cvePatches/CVE-2017-2671/^4.10/0001.patch -git apply $cvePatches/CVE-2017-5669/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5972/ANY/0002.patch -git apply $cvePatches/CVE-2017-5986/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6001/^4.9/0002.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6346/3.18/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6353/^4.10/0001.patch -git apply $cvePatches/CVE-2017-7371/3.18/0001.patch -git apply $cvePatches/CVE-2017-7372/ANY/0001.patch -git apply $cvePatches/CVE-2017-7472/ANY/0001.patch -git apply $cvePatches/CVE-2017-7487/ANY/0001.patch -git apply $cvePatches/CVE-2017-7616/^4.10/0001.patch -git apply $cvePatches/CVE-2017-7618/^4.10/0002.patch -git apply $cvePatches/CVE-2017-8247/ANY/0001.patch -git apply $cvePatches/CVE-2017-8280/ANY/0001.patch -git apply $cvePatches/CVE-2017-9075/^4.11/0001.patch -git apply $cvePatches/CVE-2017-9242/^4.11/0001.patch -git apply $cvePatches/CVE-2017-9676/3.18/0002.patch -git apply $cvePatches/CVE-2017-9686/ANY/0001.patch -git apply $cvePatches/CVE-2017-9687/3.18/0001.patch -git apply $cvePatches/CVE-2017-9690/3.18/0001.patch -git apply $cvePatches/CVE-2017-9697/3.18/0001.patch -git apply $cvePatches/CVE-2017-9700/ANY/0001.patch -git apply $cvePatches/CVE-2017-9719/3.18/0001.patch -git apply $cvePatches/CVE-2017-9720/3.18/0002.patch -git apply $cvePatches/CVE-2017-9722/3.18/0001.patch -git apply $cvePatches/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch -git apply $cvePatches/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch -git apply $cvePatches/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch -git apply $cvePatches/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch -git apply $cvePatches/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/google/marlin" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0003.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0019.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0020.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0021.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0022.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0023.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0024.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0025.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0026.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0027.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0028.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0031.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0032.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0033.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0034.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0035.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0036.patch +#git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0037.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0038.patch +#git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0039.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0040.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0041.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0042.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0043.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0044.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0045.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0046.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0050.patch +git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch +git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch +git apply $cvePatchesLinux/CVE-2015-8966/3.15+/0001.patch +git apply $cvePatchesLinux/CVE-2016-10088/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch +git apply $cvePatchesLinux/CVE-2016-2847/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3156/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-3906/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5854/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5856/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5867/3.18/0002.patch +git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7042/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-8418/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8483/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch +git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch +git apply $cvePatchesLinux/CVE-2017-0510/3.18/0003.patch +git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0610/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-0622/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0749/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0008.patch +git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0009.patch +git apply $cvePatchesLinux/CVE-2017-1000364/3.18/0010.patch +git apply $cvePatchesLinux/CVE-2017-1000365/3.18/0002.patch +git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-10998/3.18/0002.patch +git apply $cvePatchesLinux/CVE-2017-11001/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11002/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-11013/qcacld-2.0/0002.patch +git apply $cvePatchesLinux/CVE-2017-11014/qcacld-2.0/0001.patch +git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0003.patch +git apply $cvePatchesLinux/CVE-2017-11015/qcacld-2.0/0004.patch +git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11025/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11028/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-11030/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-11031/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11032/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11033/3.18/0002.patch +git apply $cvePatchesLinux/CVE-2017-11044/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11045/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11049/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11057/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11067/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11091/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-11093/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-12146/3.16+/0001.patch +git apply $cvePatchesLinux/CVE-2017-14897/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-15868/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch +git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch +git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-5986/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6353/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-7371/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-7372/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7616/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-7618/^4.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9075/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-9676/3.18/0002.patch +git apply $cvePatchesLinux/CVE-2017-9686/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9687/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-9690/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-9697/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-9700/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9719/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-9720/3.18/0002.patch +git apply $cvePatchesLinux/CVE-2017-9722/3.18/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch +git apply $cvePatchesLinux/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch +git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch +git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch +git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_msm.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_msm.sh index 9eb83f69..04bb3b6f 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_msm.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_google_msm.sh @@ -1,42 +1,42 @@ #!/bin/bash -cd $base"kernel/google/msm" -git apply $cvePatches/CVE-2013-4738/ANY/0002.patch -git apply $cvePatches/CVE-2014-9781/ANY/0001.patch -git apply $cvePatches/CVE-2015-1593/ANY/0001.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-3894/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-8402/3.4/0001.patch -git apply $cvePatches/CVE-2016-8404/ANY/0001.patch -git apply $cvePatches/CVE-2017-0611/3.4/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0710/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0751/ANY/0001.patch -git apply $cvePatches/CVE-2017-0786/ANY/0001.patch -#git apply $cvePatches/CVE-2017-11015/prima/0001.patch -#git apply $cvePatches/CVE-2017-11015/prima/0002.patch -git apply $cvePatches/CVE-2017-11089/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-13080/ANY/0001.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0001.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0002.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0003.patch -git apply $cvePatches/CVE-2017-13080-Extra/ANY/0004.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-7533/3.4/0001.patch -git apply $cvePatches/CVE-2017-8246/3.4/0002.patch -git apply $cvePatches/CVE-2017-8254/3.4/0001.patch -git apply $cvePatches/CVE-2017-8254/3.4/0002.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/google/msm" +git apply $cvePatchesLinux/CVE-2013-4738/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-8402/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch +#git apply $cvePatchesLinux/CVE-2017-11015/prima/0001.patch +#git apply $cvePatchesLinux/CVE-2017-11015/prima/0002.patch +git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-13080/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2017-13080-Extra/ANY/0004.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch +git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_flounder.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_flounder.sh index 83177812..f86f9791 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_flounder.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_flounder.sh @@ -1,65 +1,65 @@ #!/bin/bash -cd $base"kernel/htc/flounder" -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0001.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0004.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0005.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0006.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0007.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0008.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0009.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0010.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0011.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0012.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0013.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0014.patch -git apply $cvePatches/CVE-2014-9892/ANY/0001.patch -git apply $cvePatches/CVE-2014-9900/ANY/0001.patch -git apply $cvePatches/CVE-2015-7515/^4.4/0002.patch -git apply $cvePatches/CVE-2015-8944/ANY/0001.patch -git apply $cvePatches/CVE-2015-8955/ANY/0001.patch -git apply $cvePatches/CVE-2016-10208/3.10-^3.16/0001.patch -git apply $cvePatches/CVE-2016-2475/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-8453/ANY/0001.patch -git apply $cvePatches/CVE-2016-8464/3.10/0001.patch -git apply $cvePatches/CVE-2016-8650/ANY/0001.patch -git apply $cvePatches/CVE-2016-9576/3.10/0002.patch -git apply $cvePatches/CVE-2016-9604/ANY/0001.patch -git apply $cvePatches/CVE-2017-0449/ANY/0001.patch -git apply $cvePatches/CVE-2017-0537/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0861/3.10/0001.patch -git apply $cvePatches/CVE-2017-0862/3.10/0001.patch -git apply $cvePatches/CVE-2017-1000365/3.10/0001.patch -git apply $cvePatches/CVE-2017-1000380/^4.11/0001.patch -git apply $cvePatches/CVE-2017-10996/ANY/0001.patch -git apply $cvePatches/CVE-2017-11089/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16531/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16643/3.5+/0001.patch -git apply $cvePatches/CVE-2017-16645/ANY/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-2671/^4.10/0001.patch -git apply $cvePatches/CVE-2017-5669/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5970/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5972/ANY/0002.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6951/^3.14/0001.patch -git apply $cvePatches/CVE-2017-7472/ANY/0001.patch -git apply $cvePatches/CVE-2017-9242/^4.11/0001.patch -git apply $cvePatches/LVT-2017-0003/3.10/0001.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/htc/flounder" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0004.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0007.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0008.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0009.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0010.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0011.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0012.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0013.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0014.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0015.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch +git apply $cvePatchesLinux/CVE-2014-9892/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch +git apply $cvePatchesLinux/CVE-2015-8944/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-8453/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8464/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0449/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-10996/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch +git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5970/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch +git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8974.sh index 56565608..02949bf4 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8974.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8974.sh @@ -1,24 +1,25 @@ #!/bin/bash -cd $base"kernel/htc/msm8974" -git apply $cvePatches/CVE-2014-9781/ANY/0001.patch -git apply $cvePatches/CVE-2016-2443/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-8404/ANY/0001.patch -git apply $cvePatches/CVE-2017-0610/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0786/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16525/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/htc/msm8974" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh index f9c3ba47..65b7a0e0 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh @@ -1,175 +1,175 @@ #!/bin/bash -cd $base"kernel/htc/msm8994" -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0001-No_dir-relax.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0002.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0003.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0004.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0005.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0006.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0007.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0008.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0009.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0010.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0011.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0012.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0013.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0014.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0015.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0016.patch -git apply $cvePatches/CVE-2013-7446/^4.3/0002.patch -git apply $cvePatches/CVE-2013-7446/^4.3/0003.patch -git apply $cvePatches/CVE-2014-9781/ANY/0001.patch -git apply $cvePatches/CVE-2014-9903/ANY/0001.patch -git apply $cvePatches/CVE-2014-9904/ANY/0001.patch -git apply $cvePatches/CVE-2015-8019/3.10/0001.patch -git apply $cvePatches/CVE-2015-8942/ANY/0001.patch -git apply $cvePatches/CVE-2015-8955/ANY/0001.patch -git apply $cvePatches/CVE-2015-8967/ANY/0001.patch -git apply $cvePatches/CVE-2016-0758/ANY/0001.patch -git apply $cvePatches/CVE-2016-10044/3.10/0001.patch -git apply $cvePatches/CVE-2016-10200/ANY/0001.patch -git apply $cvePatches/CVE-2016-10208/3.10-^3.16/0001.patch -git apply $cvePatches/CVE-2016-10230/ANY/0001.patch -git apply $cvePatches/CVE-2016-10234/3.10/0001.patch -git apply $cvePatches/CVE-2016-2185/ANY/0001.patch -git apply $cvePatches/CVE-2016-2186/ANY/0001.patch -git apply $cvePatches/CVE-2016-2187/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0002.patch -git apply $cvePatches/CVE-2016-2544/ANY/0001.patch -git apply $cvePatches/CVE-2016-3136/ANY/0001.patch -git apply $cvePatches/CVE-2016-3137/ANY/0001.patch -git apply $cvePatches/CVE-2016-3140/ANY/0001.patch -git apply $cvePatches/CVE-2016-3689/ANY/0001.patch -git apply $cvePatches/CVE-2016-3809/ANY/0001.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0002.patch -git apply $cvePatches/CVE-2016-3906/ANY/0001.patch -git apply $cvePatches/CVE-2016-3907/3.10/0002.patch -git apply $cvePatches/CVE-2016-3934/ANY/0001.patch -git apply $cvePatches/CVE-2016-5345/ANY/0001.patch -git apply $cvePatches/CVE-2016-5853/3.10/0001.patch -git apply $cvePatches/CVE-2016-5858/ANY/0001.patch -git apply $cvePatches/CVE-2016-5858/ANY/0002.patch -git apply $cvePatches/CVE-2016-5867/3.10/0001.patch -git apply $cvePatches/CVE-2016-5868/3.10/0001.patch -git apply $cvePatches/CVE-2016-5870/ANY/0001.patch -git apply $cvePatches/CVE-2016-6672/ANY/0001.patch -git apply $cvePatches/CVE-2016-6693/ANY/0001.patch -git apply $cvePatches/CVE-2016-6696/ANY/0001.patch -git apply $cvePatches/CVE-2016-6738/ANY/0001.patch -#git apply $cvePatches/CVE-2016-6741/3.10/0001.patch -git apply $cvePatches/CVE-2016-6751/ANY/0001.patch -git apply $cvePatches/CVE-2016-6753/ANY/0001.patch -git apply $cvePatches/CVE-2016-7097/3.10/0002.patch -git apply $cvePatches/CVE-2016-7097/3.10/0003.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-7910/ANY/0001.patch -git apply $cvePatches/CVE-2016-7913/ANY/0001.patch -git apply $cvePatches/CVE-2016-7915/ANY/0001.patch -git apply $cvePatches/CVE-2016-8399/ANY/0001.patch -git apply $cvePatches/CVE-2016-8401/ANY/0001.patch -git apply $cvePatches/CVE-2016-8404/ANY/0001.patch -git apply $cvePatches/CVE-2016-8413/ANY/0001.patch -git apply $cvePatches/CVE-2016-8417/ANY/0001.patch -git apply $cvePatches/CVE-2016-8444/ANY/0001.patch -git apply $cvePatches/CVE-2016-8450/ANY/0001.patch -git apply $cvePatches/CVE-2016-8477/3.10/0001.patch -git apply $cvePatches/CVE-2016-8480/3.10/0001.patch -git apply $cvePatches/CVE-2016-8481/ANY/0001.patch -git apply $cvePatches/CVE-2016-8650/ANY/0001.patch -git apply $cvePatches/CVE-2016-9576/3.10/0002.patch -git apply $cvePatches/CVE-2016-9604/ANY/0001.patch -git apply $cvePatches/CVE-2016-9754/ANY/0001.patch -git apply $cvePatches/CVE-2016-9793/ANY/0001.patch -git apply $cvePatches/CVE-2016-9794/ANY/0001.patch -git apply $cvePatches/CVE-2017-0403/3.0-^3.18/0001.patch -git apply $cvePatches/CVE-2017-0404/^3.18/0001.patch -git apply $cvePatches/CVE-2017-0427/3.10/0001.patch -git apply $cvePatches/CVE-2017-0445/ANY/0001.patch -git apply $cvePatches/CVE-2017-0452/ANY/0001.patch -git apply $cvePatches/CVE-2017-0457/3.10/0002.patch -git apply $cvePatches/CVE-2017-0516/ANY/0001.patch -git apply $cvePatches/CVE-2017-0520/ANY/0001.patch -git apply $cvePatches/CVE-2017-0524/ANY/0001.patch -git apply $cvePatches/CVE-2017-0537/ANY/0001.patch -git apply $cvePatches/CVE-2017-0576/ANY/0001.patch -git apply $cvePatches/CVE-2017-0604/ANY/0001.patch -git apply $cvePatches/CVE-2017-0606/ANY/0001.patch -git apply $cvePatches/CVE-2017-0607/ANY/0001.patch -git apply $cvePatches/CVE-2017-0610/ANY/0001.patch -git apply $cvePatches/CVE-2017-0611/3.10/0002.patch -git apply $cvePatches/CVE-2017-0620/ANY/0001.patch -git apply $cvePatches/CVE-2017-0621/ANY/0001.patch -git apply $cvePatches/CVE-2017-0627/ANY/0001.patch -git apply $cvePatches/CVE-2017-0630/3.10/0001.patch -git apply $cvePatches/CVE-2017-0630/3.10/0002.patch -git apply $cvePatches/CVE-2017-0631/ANY/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0710/ANY/0001.patch -git apply $cvePatches/CVE-2017-0746/ANY/0001.patch -git apply $cvePatches/CVE-2017-0748/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0751/ANY/0001.patch -git apply $cvePatches/CVE-2017-0861/3.10/0001.patch -git apply $cvePatches/CVE-2017-0862/3.10/0001.patch -git apply $cvePatches/CVE-2017-1000365/3.10/0001.patch -git apply $cvePatches/CVE-2017-1000380/^4.11/0001.patch -git apply $cvePatches/CVE-2017-10999/ANY/0001.patch -git apply $cvePatches/CVE-2017-11019/ANY/0001.patch -git apply $cvePatches/CVE-2017-11024/ANY/0001.patch -git apply $cvePatches/CVE-2017-11033/3.10/0001.patch -git apply $cvePatches/CVE-2017-11046/ANY/0001.patch -git apply $cvePatches/CVE-2017-11056/ANY/0001.patch -git apply $cvePatches/CVE-2017-11059/ANY/0001.patch -git apply $cvePatches/CVE-2017-11085/3.10/0001.patch -git apply $cvePatches/CVE-2017-11089/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-11092/ANY/0001.patch -git apply $cvePatches/CVE-2017-11600/3.10/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16531/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16643/3.5+/0001.patch -git apply $cvePatches/CVE-2017-16645/ANY/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-2618/3.10/0001.patch -git apply $cvePatches/CVE-2017-2671/^4.10/0001.patch -git apply $cvePatches/CVE-2017-5669/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5970/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5972/ANY/0002.patch -git apply $cvePatches/CVE-2017-6074/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6951/^3.14/0001.patch -git apply $cvePatches/CVE-2017-7184/ANY/0001.patch -git apply $cvePatches/CVE-2017-7184/ANY/0002.patch -git apply $cvePatches/CVE-2017-7308/ANY/0003.patch -git apply $cvePatches/CVE-2017-7369/3.10/0001.patch -git apply $cvePatches/CVE-2017-7373/3.10/0001.patch -git apply $cvePatches/CVE-2017-7472/ANY/0001.patch -git apply $cvePatches/CVE-2017-7541/3.10/0002.patch -git apply $cvePatches/CVE-2017-8246/3.10/0003.patch -git apply $cvePatches/CVE-2017-8251/3.10/0001.patch -git apply $cvePatches/CVE-2017-8260/3.10/0001.patch -git apply $cvePatches/CVE-2017-8261/3.10/0001.patch -git apply $cvePatches/CVE-2017-8262/3.10/0001.patch -git apply $cvePatches/CVE-2017-8265/ANY/0001.patch -git apply $cvePatches/CVE-2017-8280/ANY/0001.patch -git apply $cvePatches/CVE-2017-9242/^4.11/0001.patch -git apply $cvePatches/CVE-2017-9702/3.10/0001.patch -git apply $cvePatches/CVE-2017-9706/ANY/0001.patch -git apply $cvePatches/LVT-2017-0003/3.10/0001.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/htc/msm8994" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0005.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0006.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0007.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0008.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0009.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0010.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0011.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0012.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0013.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0014.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0015.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2013-7446/^4.3/0002.patch +git apply $cvePatchesLinux/CVE-2013-7446/^4.3/0003.patch +git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9903/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9904/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8019/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2015-8942/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8967/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-0758/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10044/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-10200/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2016-10230/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10234/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3809/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-3906/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3907/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2016-3934/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5853/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5858/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5868/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6738/ANY/0001.patch +#git apply $cvePatchesLinux/CVE-2016-6741/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7097/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2016-7097/3.10/0003.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-7910/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7915/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8399/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8401/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8413/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8417/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8444/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8450/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8477/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-8480/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9754/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9793/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9794/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0403/3.0-^3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0427/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-0445/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0452/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0457/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0520/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0576/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0606/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0607/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0611/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-0620/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0621/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0630/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-0630/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-0631/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0746/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0748/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-10999/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11024/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11056/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11059/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11085/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11092/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch +git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5970/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-7184/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7184/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2017-7369/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-7373/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-8246/3.10/0003.patch +git apply $cvePatchesLinux/CVE-2017-8251/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-8260/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-8261/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-8262/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-8265/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-9702/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch +git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_huawei_angler.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_huawei_angler.sh index 90fcf64c..51bb16bd 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_huawei_angler.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_huawei_angler.sh @@ -1,110 +1,110 @@ #!/bin/bash -cd $base"kernel/huawei/angler" -git apply $cvePatches/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0001.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0002.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0003.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0004.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0005.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0006.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0007.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0008.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0009.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0010.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0011.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0012.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0013.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0014.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0015.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0016.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0017.patch -git apply $cvePatches/CVE-2014-8160/^3.18/0002.patch -git apply $cvePatches/CVE-2014-8173/3.9-^3.12/0001.patch -git apply $cvePatches/CVE-2014-9781/ANY/0001.patch -git apply $cvePatches/CVE-2015-0573/ANY/0001.patch -git apply $cvePatches/CVE-2015-2041/^3.19/0002.patch -git apply $cvePatches/CVE-2015-5366/3.10/0001.patch -git apply $cvePatches/CVE-2015-7515/^4.4/0002.patch -git apply $cvePatches/CVE-2015-7550/^4.3/0001.patch -git apply $cvePatches/CVE-2016-0805/ANY/0001.patch -git apply $cvePatches/CVE-2016-0843/ANY/0001.patch -git apply $cvePatches/CVE-2016-10208/3.10-^3.16/0001.patch -git apply $cvePatches/CVE-2016-2063/ANY/0001.patch -git apply $cvePatches/CVE-2016-2185/ANY/0001.patch -git apply $cvePatches/CVE-2016-2186/ANY/0001.patch -git apply $cvePatches/CVE-2016-2187/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0002.patch -git apply $cvePatches/CVE-2016-2384/^4.5/0001.patch -git apply $cvePatches/CVE-2016-2438/ANY/0001.patch -git apply $cvePatches/CVE-2016-2469/3.10/0001.patch -git apply $cvePatches/CVE-2016-2475/ANY/0001.patch -git apply $cvePatches/CVE-2016-2544/ANY/0001.patch -git apply $cvePatches/CVE-2016-2545/^4.4/0001.patch -git apply $cvePatches/CVE-2016-2549/^4.4/0001.patch -git apply $cvePatches/CVE-2016-3070/ANY/0001.patch -git apply $cvePatches/CVE-2016-3136/ANY/0001.patch -git apply $cvePatches/CVE-2016-3137/ANY/0001.patch -git apply $cvePatches/CVE-2016-3138/ANY/0001.patch -git apply $cvePatches/CVE-2016-3140/ANY/0001.patch -git apply $cvePatches/CVE-2016-3689/ANY/0001.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0001.patch -git apply $cvePatches/CVE-2016-3894/ANY/0001.patch -git apply $cvePatches/CVE-2016-5345/ANY/0001.patch -git apply $cvePatches/CVE-2016-5858/ANY/0001.patch -git apply $cvePatches/CVE-2016-5859/3.10/0001.patch -git apply $cvePatches/CVE-2016-5867/3.10/0001.patch -git apply $cvePatches/CVE-2016-5868/3.10/0001.patch -git apply $cvePatches/CVE-2016-5870/ANY/0001.patch -git apply $cvePatches/CVE-2016-6672/ANY/0001.patch -git apply $cvePatches/CVE-2016-6693/ANY/0001.patch -git apply $cvePatches/CVE-2016-6694/ANY/0001.patch -git apply $cvePatches/CVE-2016-6695/ANY/0001.patch -git apply $cvePatches/CVE-2016-6696/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-8404/ANY/0001.patch -git apply $cvePatches/CVE-2016-8481/ANY/0001.patch -git apply $cvePatches/CVE-2016-9576/3.10/0002.patch -git apply $cvePatches/CVE-2016-9604/ANY/0001.patch -git apply $cvePatches/CVE-2017-0510/3.10/0002.patch -git apply $cvePatches/CVE-2017-0516/ANY/0001.patch -git apply $cvePatches/CVE-2017-0524/ANY/0001.patch -git apply $cvePatches/CVE-2017-0537/ANY/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0824/ANY/0001.patch -git apply $cvePatches/CVE-2017-1000365/3.10/0001.patch -git apply $cvePatches/CVE-2017-1000380/^4.11/0001.patch -git apply $cvePatches/CVE-2017-11016/ANY/0001.patch -git apply $cvePatches/CVE-2017-11033/3.10/0001.patch -git apply $cvePatches/CVE-2017-11600/3.10/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16531/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16643/3.5+/0001.patch -git apply $cvePatches/CVE-2017-16645/ANY/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-2618/3.10/0001.patch -git apply $cvePatches/CVE-2017-2671/^4.10/0001.patch -git apply $cvePatches/CVE-2017-5669/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5972/ANY/0002.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6951/^3.14/0001.patch -git apply $cvePatches/CVE-2017-7472/ANY/0001.patch -git apply $cvePatches/CVE-2017-7487/ANY/0001.patch -git apply $cvePatches/CVE-2017-8280/ANY/0001.patch -git apply $cvePatches/CVE-2017-9242/^4.11/0001.patch -git apply $cvePatches/LVT-2017-0003/3.10/0001.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/huawei/angler" +git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0004.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0005.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0006.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0007.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0008.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0009.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0010.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0011.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0012.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0013.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0014.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0015.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch +git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch +git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch +git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch +git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch +git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch +git apply $cvePatchesLinux/CVE-2016-2438/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch +git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch +git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5868/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0824/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch +git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch +git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_bullhead.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_bullhead.sh index dcea3e96..e185fe8d 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_bullhead.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_bullhead.sh @@ -1,103 +1,103 @@ #!/bin/bash -cd $base"kernel/lge/bullhead" -git apply $cvePatches/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0001.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0002.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0003.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0004.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0005.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0006.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0007.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0008.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0009.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0010.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0011.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0012.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0013.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0014.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0015.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0016.patch -git apply $cvePatches/CVE-2014-8160/^3.18/0002.patch -git apply $cvePatches/CVE-2014-8173/3.9-^3.12/0001.patch -git apply $cvePatches/CVE-2014-9781/ANY/0001.patch -git apply $cvePatches/CVE-2015-0573/ANY/0001.patch -git apply $cvePatches/CVE-2015-2041/^3.19/0002.patch -git apply $cvePatches/CVE-2015-5366/3.10/0001.patch -git apply $cvePatches/CVE-2015-7515/^4.4/0002.patch -git apply $cvePatches/CVE-2015-7550/^4.3/0001.patch -git apply $cvePatches/CVE-2016-0805/ANY/0001.patch -git apply $cvePatches/CVE-2016-0843/ANY/0001.patch -git apply $cvePatches/CVE-2016-10208/3.10-^3.16/0001.patch -git apply $cvePatches/CVE-2016-2063/ANY/0001.patch -git apply $cvePatches/CVE-2016-2185/ANY/0001.patch -git apply $cvePatches/CVE-2016-2186/ANY/0001.patch -git apply $cvePatches/CVE-2016-2187/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0002.patch -git apply $cvePatches/CVE-2016-2384/^4.5/0001.patch -git apply $cvePatches/CVE-2016-2438/ANY/0001.patch -git apply $cvePatches/CVE-2016-2469/3.10/0001.patch -git apply $cvePatches/CVE-2016-2544/ANY/0001.patch -git apply $cvePatches/CVE-2016-2545/^4.4/0001.patch -git apply $cvePatches/CVE-2016-2549/^4.4/0001.patch -git apply $cvePatches/CVE-2016-3070/ANY/0001.patch -git apply $cvePatches/CVE-2016-3136/ANY/0001.patch -git apply $cvePatches/CVE-2016-3137/ANY/0001.patch -git apply $cvePatches/CVE-2016-3140/ANY/0001.patch -git apply $cvePatches/CVE-2016-3689/ANY/0001.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0002.patch -git apply $cvePatches/CVE-2016-3894/ANY/0001.patch -git apply $cvePatches/CVE-2016-5345/ANY/0001.patch -git apply $cvePatches/CVE-2016-5858/ANY/0001.patch -git apply $cvePatches/CVE-2016-5859/3.10/0001.patch -git apply $cvePatches/CVE-2016-5867/3.10/0001.patch -git apply $cvePatches/CVE-2016-5870/ANY/0001.patch -git apply $cvePatches/CVE-2016-6693/ANY/0001.patch -git apply $cvePatches/CVE-2016-6694/ANY/0001.patch -git apply $cvePatches/CVE-2016-6695/ANY/0001.patch -git apply $cvePatches/CVE-2016-6696/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-7913/ANY/0001.patch -git apply $cvePatches/CVE-2016-8404/ANY/0001.patch -git apply $cvePatches/CVE-2016-8481/ANY/0001.patch -git apply $cvePatches/CVE-2016-9576/3.10/0002.patch -git apply $cvePatches/CVE-2016-9604/ANY/0001.patch -git apply $cvePatches/CVE-2017-0510/3.10/0002.patch -git apply $cvePatches/CVE-2017-0516/ANY/0001.patch -git apply $cvePatches/CVE-2017-0537/ANY/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-1000365/3.10/0001.patch -git apply $cvePatches/CVE-2017-1000380/^4.11/0001.patch -git apply $cvePatches/CVE-2017-11016/ANY/0001.patch -git apply $cvePatches/CVE-2017-11033/3.10/0001.patch -git apply $cvePatches/CVE-2017-11600/3.10/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16531/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16643/3.5+/0001.patch -git apply $cvePatches/CVE-2017-16645/ANY/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-2618/3.10/0001.patch -git apply $cvePatches/CVE-2017-2671/^4.10/0001.patch -git apply $cvePatches/CVE-2017-5669/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5972/ANY/0002.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6951/^3.14/0001.patch -git apply $cvePatches/CVE-2017-7472/ANY/0001.patch -git apply $cvePatches/CVE-2017-7487/ANY/0001.patch -git apply $cvePatches/CVE-2017-9242/^4.11/0001.patch -git apply $cvePatches/LVT-2017-0003/3.10/0001.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/lge/bullhead" +git apply $cvePatchesLinux/0001-LinuxIncrementals/3.10/3.10.0073-0074.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0004.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0005.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0006.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0007.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0008.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0009.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0010.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0011.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0012.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0013.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0014.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0015.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch +git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch +git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch +git apply $cvePatchesLinux/CVE-2015-5366/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch +git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch +git apply $cvePatchesLinux/CVE-2016-0805/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-2384/^4.5/0001.patch +git apply $cvePatchesLinux/CVE-2016-2438/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2469/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch +git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch +git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5345/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0510/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch +git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch +git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_hammerhead.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_hammerhead.sh index d76e1e38..3fdc7e91 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_hammerhead.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_hammerhead.sh @@ -1,40 +1,40 @@ #!/bin/bash -cd $base"kernel/lge/hammerhead" -git apply $cvePatches/CVE-2014-9881/ANY/0001.patch -git apply $cvePatches/CVE-2014-9882/ANY/0001.patch -git apply $cvePatches/CVE-2014-9882/ANY/0002.patch -git apply $cvePatches/CVE-2015-1593/ANY/0001.patch -git apply $cvePatches/CVE-2016-3894/ANY/0001.patch -git apply $cvePatches/CVE-2016-8650/ANY/0001.patch -git apply $cvePatches/CVE-2016-9576/3.4/0001.patch -git apply $cvePatches/CVE-2016-9604/ANY/0001.patch -git apply $cvePatches/CVE-2017-0611/3.4/0001.patch -git apply $cvePatches/CVE-2017-0710/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0751/ANY/0001.patch -git apply $cvePatches/CVE-2017-0786/ANY/0001.patch -git apply $cvePatches/CVE-2017-11089/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-2671/^4.10/0001.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6951/^3.14/0001.patch -git apply $cvePatches/CVE-2017-7533/3.4/0001.patch -git apply $cvePatches/CVE-2017-8246/3.4/0002.patch -git apply $cvePatches/CVE-2017-8247/ANY/0001.patch -git apply $cvePatches/CVE-2017-8254/3.4/0001.patch -git apply $cvePatches/CVE-2017-8254/3.4/0002.patch -git apply $cvePatches/CVE-2017-9242/^4.11/0001.patch -git apply $cvePatches/CVE-2017-9684/ANY/0001.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/lge/hammerhead" +git apply $cvePatchesLinux/CVE-2014-9881/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9882/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9882/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9576/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch +git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch +git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_mako.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_mako.sh index c04afd32..094b5bd1 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_mako.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_mako.sh @@ -1,17 +1,17 @@ #!/bin/bash -cd $base"kernel/lge/mako" -git apply $cvePatches/CVE-2013-4738/ANY/0002.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-3894/ANY/0001.patch -git apply $cvePatches/CVE-2016-9793/ANY/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/lge/mako" +git apply $cvePatchesLinux/CVE-2013-4738/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9793/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_moto_shamu.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_moto_shamu.sh index 7c883148..707c860c 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_moto_shamu.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_moto_shamu.sh @@ -1,98 +1,98 @@ #!/bin/bash -cd $base"kernel/moto/shamu" -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0001-No_dir-relax.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0004.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0005.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0006.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0007.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0008.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0009.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0010.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0011.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0012.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0013.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0014.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0015.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0017.patch -git apply $cvePatches/CVE-2014-8160/^3.18/0002.patch -git apply $cvePatches/CVE-2014-8173/3.9-^3.12/0001.patch -git apply $cvePatches/CVE-2014-9420/ANY/0001.patch -git apply $cvePatches/CVE-2014-9683/^3.18/0002.patch -git apply $cvePatches/CVE-2014-9715/^3.14/0002.patch -git apply $cvePatches/CVE-2014-9781/ANY/0001.patch -git apply $cvePatches/CVE-2015-1420/3.2-^3.19/0001.patch -git apply $cvePatches/CVE-2015-1593/ANY/0001.patch -git apply $cvePatches/CVE-2015-2041/^3.19/0002.patch -git apply $cvePatches/CVE-2015-7515/^4.4/0002.patch -git apply $cvePatches/CVE-2015-7550/^4.3/0001.patch -git apply $cvePatches/CVE-2015-8955/ANY/0001.patch -git apply $cvePatches/CVE-2015-8967/ANY/0001.patch -git apply $cvePatches/CVE-2016-0758/ANY/0001.patch -git apply $cvePatches/CVE-2016-10208/3.10-^3.16/0001.patch -git apply $cvePatches/CVE-2016-2185/ANY/0001.patch -git apply $cvePatches/CVE-2016-2186/ANY/0001.patch -git apply $cvePatches/CVE-2016-2187/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0002.patch -git apply $cvePatches/CVE-2016-2475/ANY/0001.patch -git apply $cvePatches/CVE-2016-2544/ANY/0001.patch -git apply $cvePatches/CVE-2016-2545/^4.4/0001.patch -git apply $cvePatches/CVE-2016-2549/^4.4/0001.patch -git apply $cvePatches/CVE-2016-3070/ANY/0001.patch -git apply $cvePatches/CVE-2016-3136/ANY/0001.patch -git apply $cvePatches/CVE-2016-3137/ANY/0001.patch -git apply $cvePatches/CVE-2016-3138/ANY/0001.patch -git apply $cvePatches/CVE-2016-3140/ANY/0001.patch -git apply $cvePatches/CVE-2016-3689/ANY/0001.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0002.patch -git apply $cvePatches/CVE-2016-3894/ANY/0001.patch -git apply $cvePatches/CVE-2016-5870/ANY/0001.patch -git apply $cvePatches/CVE-2016-6672/ANY/0001.patch -git apply $cvePatches/CVE-2016-6695/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-7913/ANY/0001.patch -git apply $cvePatches/CVE-2016-8404/ANY/0001.patch -git apply $cvePatches/CVE-2016-8464/3.10/0001.patch -git apply $cvePatches/CVE-2016-8650/ANY/0001.patch -git apply $cvePatches/CVE-2016-9576/3.10/0002.patch -git apply $cvePatches/CVE-2016-9604/ANY/0001.patch -git apply $cvePatches/CVE-2017-0404/^3.18/0001.patch -git apply $cvePatches/CVE-2017-0524/ANY/0001.patch -git apply $cvePatches/CVE-2017-0537/ANY/0001.patch -git apply $cvePatches/CVE-2017-0627/ANY/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0824/ANY/0001.patch -git apply $cvePatches/CVE-2017-1000365/3.10/0001.patch -git apply $cvePatches/CVE-2017-11024/ANY/0001.patch -git apply $cvePatches/CVE-2017-11600/3.10/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16531/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16643/3.5+/0001.patch -git apply $cvePatches/CVE-2017-16645/ANY/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-2618/3.10/0001.patch -git apply $cvePatches/CVE-2017-2671/^4.10/0001.patch -git apply $cvePatches/CVE-2017-5669/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5972/ANY/0002.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6951/^3.14/0001.patch -git apply $cvePatches/CVE-2017-7472/ANY/0001.patch -git apply $cvePatches/CVE-2017-7487/ANY/0001.patch -git apply $cvePatches/CVE-2017-8269/ANY/0001.patch -git apply $cvePatches/CVE-2017-9242/^4.11/0001.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/moto/shamu" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0007.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0008.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0009.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0010.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0011.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0012.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0013.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0014.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0015.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2014-8160/^3.18/0002.patch +git apply $cvePatchesLinux/CVE-2014-8173/3.9-^3.12/0001.patch +git apply $cvePatchesLinux/CVE-2014-9420/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9683/^3.18/0002.patch +git apply $cvePatchesLinux/CVE-2014-9715/^3.14/0002.patch +git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-1420/3.2-^3.19/0001.patch +git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch +git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch +git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch +git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8967/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-0758/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10208/3.10-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2545/^4.4/0001.patch +git apply $cvePatchesLinux/CVE-2016-2549/^4.4/0001.patch +git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3138/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5870/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8464/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0824/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11024/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch +git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-8269/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8916.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8916.sh index da512579..e58251f2 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8916.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8916.sh @@ -1,80 +1,80 @@ #!/bin/bash -cd $base"kernel/motorola/msm8916" -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0001-No_dir-relax.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0002.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0004.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0005.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0006.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0007.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0008.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0009.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0010.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0011.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0012.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0013.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0014.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0015.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0016.patch -git apply $cvePatches/CVE-2014-9420/ANY/0001.patch -git apply $cvePatches/CVE-2014-9781/ANY/0001.patch -git apply $cvePatches/CVE-2015-1593/ANY/0001.patch -git apply $cvePatches/CVE-2015-7515/^4.4/0002.patch -git apply $cvePatches/CVE-2015-8950/ANY/0001.patch -git apply $cvePatches/CVE-2015-8955/ANY/0001.patch -git apply $cvePatches/CVE-2015-8967/ANY/0001.patch -git apply $cvePatches/CVE-2016-3137/ANY/0001.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0002.patch -git apply $cvePatches/CVE-2016-3892/ANY/0001.patch -git apply $cvePatches/CVE-2016-3894/ANY/0001.patch -git apply $cvePatches/CVE-2016-3902/ANY/0001.patch -git apply $cvePatches/CVE-2016-5858/ANY/0001.patch -git apply $cvePatches/CVE-2016-5858/ANY/0002.patch -git apply $cvePatches/CVE-2016-5859/3.10/0001.patch -git apply $cvePatches/CVE-2016-5867/3.10/0001.patch -git apply $cvePatches/CVE-2016-6672/ANY/0001.patch -git apply $cvePatches/CVE-2016-6693/ANY/0001.patch -git apply $cvePatches/CVE-2016-6694/ANY/0001.patch -git apply $cvePatches/CVE-2016-6695/ANY/0001.patch -git apply $cvePatches/CVE-2016-6696/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-8481/ANY/0003.patch -git apply $cvePatches/CVE-2016-9576/3.10/0002.patch -git apply $cvePatches/CVE-2017-0457/3.10/0002.patch -git apply $cvePatches/CVE-2017-0524/ANY/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0861/3.10/0001.patch -git apply $cvePatches/CVE-2017-0862/3.10/0001.patch -git apply $cvePatches/CVE-2017-11016/ANY/0001.patch -git apply $cvePatches/CVE-2017-11024/ANY/0001.patch -git apply $cvePatches/CVE-2017-11033/3.10/0001.patch -git apply $cvePatches/CVE-2017-11085/3.10/0001.patch -git apply $cvePatches/CVE-2017-11089/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-11600/3.10/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16531/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16643/3.5+/0001.patch -git apply $cvePatches/CVE-2017-16645/ANY/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-5972/ANY/0002.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-7541/3.10/0002.patch -git apply $cvePatches/CVE-2017-9702/3.10/0001.patch -git apply $cvePatches/LVT-2017-0003/3.10/0001.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/motorola/msm8916" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0005.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0007.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0008.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0009.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0010.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0011.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0012.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0013.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0014.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0015.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9420/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-1593/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch +git apply $cvePatchesLinux/CVE-2015-8950/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8967/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3902/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5858/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6694/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6695/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-8481/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-0457/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11016/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11024/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11085/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch +git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-9702/3.10/0001.patch +git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh index a2836926..7a4d2612 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh @@ -1,156 +1,156 @@ #!/bin/bash -cd $base"kernel/motorola/msm8992" -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0001-No_dir-relax.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0002.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0003.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0004.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0005.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0006.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0007.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0008.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0009.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0010.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0011.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0012.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0013.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0014.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0015.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0016.patch -git apply $cvePatches/CVE-2013-7446/^4.3/0003.patch -git apply $cvePatches/CVE-2014-9781/ANY/0001.patch -git apply $cvePatches/CVE-2015-0573/ANY/0001.patch -git apply $cvePatches/CVE-2015-8019/3.10/0001.patch -git apply $cvePatches/CVE-2015-8955/ANY/0001.patch -git apply $cvePatches/CVE-2016-0758/ANY/0001.patch -git apply $cvePatches/CVE-2016-0806/qcacld-2.0/0026.patch -git apply $cvePatches/CVE-2016-0806/qcacld-2.0/0027.patch -git apply $cvePatches/CVE-2016-0843/ANY/0001.patch -git apply $cvePatches/CVE-2016-10200/ANY/0001.patch -git apply $cvePatches/CVE-2016-10230/ANY/0001.patch -git apply $cvePatches/CVE-2016-10232/3.10/0001.patch -git apply $cvePatches/CVE-2016-2063/ANY/0001.patch -git apply $cvePatches/CVE-2016-3070/ANY/0001.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-3860/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0002.patch -git apply $cvePatches/CVE-2016-3867/3.10/0001.patch -git apply $cvePatches/CVE-2016-3892/ANY/0001.patch -git apply $cvePatches/CVE-2016-3894/ANY/0001.patch -git apply $cvePatches/CVE-2016-3902/ANY/0001.patch -git apply $cvePatches/CVE-2016-3907/3.10/0002.patch -git apply $cvePatches/CVE-2016-3938/ANY/0001.patch -git apply $cvePatches/CVE-2016-5853/3.10/0001.patch -git apply $cvePatches/CVE-2016-5858/ANY/0001.patch -git apply $cvePatches/CVE-2016-5858/ANY/0002.patch -git apply $cvePatches/CVE-2016-5859/3.10/0001.patch -git apply $cvePatches/CVE-2016-5867/3.10/0001.patch -git apply $cvePatches/CVE-2016-5868/3.10/0001.patch -git apply $cvePatches/CVE-2016-6672/ANY/0001.patch -git apply $cvePatches/CVE-2016-6693/ANY/0001.patch -git apply $cvePatches/CVE-2016-6696/ANY/0001.patch -git apply $cvePatches/CVE-2016-6751/ANY/0001.patch -git apply $cvePatches/CVE-2016-6753/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-7913/ANY/0001.patch -git apply $cvePatches/CVE-2016-8417/ANY/0001.patch -git apply $cvePatches/CVE-2016-8444/ANY/0001.patch -git apply $cvePatches/CVE-2016-8477/3.10/0001.patch -git apply $cvePatches/CVE-2016-8481/ANY/0001.patch -git apply $cvePatches/CVE-2016-8650/ANY/0001.patch -git apply $cvePatches/CVE-2016-9576/3.10/0002.patch -git apply $cvePatches/CVE-2016-9604/ANY/0001.patch -git apply $cvePatches/CVE-2017-0404/^3.18/0001.patch -git apply $cvePatches/CVE-2017-0427/3.10/0001.patch -git apply $cvePatches/CVE-2017-0452/ANY/0001.patch -git apply $cvePatches/CVE-2017-0454/3.10/0001.patch -git apply $cvePatches/CVE-2017-0457/3.10/0002.patch -git apply $cvePatches/CVE-2017-0460/3.10/0001.patch -git apply $cvePatches/CVE-2017-0516/ANY/0001.patch -git apply $cvePatches/CVE-2017-0524/ANY/0001.patch -git apply $cvePatches/CVE-2017-0537/ANY/0001.patch -git apply $cvePatches/CVE-2017-0604/ANY/0001.patch -git apply $cvePatches/CVE-2017-0606/ANY/0001.patch -git apply $cvePatches/CVE-2017-0610/ANY/0001.patch -git apply $cvePatches/CVE-2017-0611/3.10/0002.patch -git apply $cvePatches/CVE-2017-0627/ANY/0001.patch -git apply $cvePatches/CVE-2017-0630/3.10/0002.patch -git apply $cvePatches/CVE-2017-0631/ANY/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0710/ANY/0001.patch -git apply $cvePatches/CVE-2017-0746/ANY/0001.patch -git apply $cvePatches/CVE-2017-0748/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0751/ANY/0001.patch -git apply $cvePatches/CVE-2017-0861/3.10/0001.patch -git apply $cvePatches/CVE-2017-0862/3.10/0001.patch -git apply $cvePatches/CVE-2017-1000365/3.10/0001.patch -git apply $cvePatches/CVE-2017-1000380/^4.11/0001.patch -git apply $cvePatches/CVE-2017-10997/3.10/0001.patch -git apply $cvePatches/CVE-2017-10998/3.10/0001.patch -git apply $cvePatches/CVE-2017-11014/qcacld-2.0/0001.patch -git apply $cvePatches/CVE-2017-11019/ANY/0001.patch -git apply $cvePatches/CVE-2017-11024/ANY/0001.patch -git apply $cvePatches/CVE-2017-11033/3.10/0001.patch -git apply $cvePatches/CVE-2017-11046/ANY/0001.patch -git apply $cvePatches/CVE-2017-11056/ANY/0001.patch -git apply $cvePatches/CVE-2017-11059/ANY/0001.patch -git apply $cvePatches/CVE-2017-11085/3.10/0001.patch -git apply $cvePatches/CVE-2017-11089/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-11092/ANY/0001.patch -git apply $cvePatches/CVE-2017-11600/3.10/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16531/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16643/3.5+/0001.patch -git apply $cvePatches/CVE-2017-16645/ANY/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-2618/3.10/0001.patch -git apply $cvePatches/CVE-2017-2671/^4.10/0001.patch -git apply $cvePatches/CVE-2017-5669/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5970/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5972/ANY/0002.patch -git apply $cvePatches/CVE-2017-6074/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6951/^3.14/0001.patch -git apply $cvePatches/CVE-2017-7184/ANY/0001.patch -git apply $cvePatches/CVE-2017-7184/ANY/0002.patch -git apply $cvePatches/CVE-2017-7187/3.10/0004.patch -git apply $cvePatches/CVE-2017-7187/3.10/0005.patch -git apply $cvePatches/CVE-2017-7187/3.10/0006.patch -git apply $cvePatches/CVE-2017-7308/ANY/0003.patch -git apply $cvePatches/CVE-2017-7369/3.10/0001.patch -git apply $cvePatches/CVE-2017-7373/3.10/0001.patch -git apply $cvePatches/CVE-2017-7472/ANY/0001.patch -git apply $cvePatches/CVE-2017-7487/ANY/0001.patch -git apply $cvePatches/CVE-2017-7541/3.10/0002.patch -git apply $cvePatches/CVE-2017-8236/3.10/0001.patch -git apply $cvePatches/CVE-2017-8247/ANY/0001.patch -git apply $cvePatches/CVE-2017-8251/3.10/0001.patch -git apply $cvePatches/CVE-2017-8260/3.10/0001.patch -git apply $cvePatches/CVE-2017-8261/3.10/0001.patch -git apply $cvePatches/CVE-2017-8262/3.10/0001.patch -git apply $cvePatches/CVE-2017-8265/ANY/0001.patch -git apply $cvePatches/CVE-2017-8280/ANY/0001.patch -git apply $cvePatches/CVE-2017-9075/^4.11/0001.patch -git apply $cvePatches/CVE-2017-9242/^4.11/0001.patch -git apply $cvePatches/CVE-2017-9696/3.10/0001.patch -git apply $cvePatches/CVE-2017-9702/3.10/0001.patch -git apply $cvePatches/CVE-2017-9720/3.10/0001.patch -git apply $cvePatches/CVE-2017-9724/ANY/0001.patch -git apply $cvePatches/CVE-2017-9725/3.10/0001.patch -git apply $cvePatches/LVT-2017-0003/3.10/0001.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/motorola/msm8992" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0005.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0006.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0007.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0008.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0009.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0010.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0011.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0012.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0013.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0014.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0015.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2013-7446/^4.3/0003.patch +git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-0573/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8019/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2015-8955/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-0758/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-0806/qcacld-2.0/0026.patch +git apply $cvePatchesLinux/CVE-2016-0806/qcacld-2.0/0027.patch +git apply $cvePatchesLinux/CVE-2016-0843/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10200/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10230/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10232/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-2063/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3070/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3860/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-3867/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-3892/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3902/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3907/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2016-3938/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5853/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5858/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-5858/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-5859/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5867/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-5868/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6751/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8417/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8444/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8477/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2016-8481/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9576/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0427/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-0452/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0454/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-0457/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-0460/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-0516/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0606/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0611/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0630/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-0631/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0746/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0748/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000365/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-10997/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-10998/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11014/qcacld-2.0/0001.patch +git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11024/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11033/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11046/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11056/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11059/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11085/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11092/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch +git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-2618/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5970/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6951/^3.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-7184/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7184/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-7187/3.10/0004.patch +git apply $cvePatchesLinux/CVE-2017-7187/3.10/0005.patch +git apply $cvePatchesLinux/CVE-2017-7187/3.10/0006.patch +git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2017-7369/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-7373/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch +git apply $cvePatchesLinux/CVE-2017-8236/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-8251/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-8260/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-8261/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-8262/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-8265/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-8280/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9075/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-9696/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-9702/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-9720/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-9724/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9725/3.10/0001.patch +git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh index ac56a36f..26b00f60 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh @@ -1,47 +1,47 @@ #!/bin/bash -cd $base"kernel/nextbit/msm8992" -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0001-No_dir-relax.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0002.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0003.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0004.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0005.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0006.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0007.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0008.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0009.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0010.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0011.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0012.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0013.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0014.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0015.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.10/0016.patch -git apply $cvePatches/CVE-2014-9904/ANY/0001.patch -git apply $cvePatches/CVE-2016-6672/ANY/0001.patch -git apply $cvePatches/CVE-2016-6693/ANY/0001.patch -git apply $cvePatches/CVE-2016-6696/ANY/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0861/3.10/0001.patch -git apply $cvePatches/CVE-2017-0862/3.10/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-11600/3.10/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16531/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16643/3.5+/0001.patch -git apply $cvePatches/CVE-2017-16645/ANY/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0003.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-7541/3.10/0002.patch -git apply $cvePatches/LVT-2017-0003/3.10/0001.patch +cd $base"kernel/kernel/nextbit/msm8992" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0004-No_dir-relax.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0005.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0006.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0007.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0008.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0009.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0010.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0011.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0012.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0013.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0014.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0015.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0016.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0017.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.10/0018.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9904/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6693/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6696/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0861/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-0862/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11600/3.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch +git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-7541/3.10/0002.patch +git apply $cvePatchesLinux/LVT-2017-0003/3.10/0001.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8974.sh index 59a4d868..67648e80 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8974.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_oneplus_msm8974.sh @@ -1,44 +1,45 @@ #!/bin/bash -cd $base"kernel/oneplus/msm8974" -git apply $cvePatches/CVE-2014-9781/ANY/0001.patch -git apply $cvePatches/CVE-2014-9880/ANY/0001.patch -git apply $cvePatches/CVE-2016-0801/ANY/0001.patch -git apply $cvePatches/CVE-2016-2443/ANY/0001.patch -git apply $cvePatches/CVE-2016-6672/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-8404/ANY/0001.patch -git apply $cvePatches/CVE-2017-0510/3.4/0001.patch -git apply $cvePatches/CVE-2017-0524/ANY/0001.patch -git apply $cvePatches/CVE-2017-0610/ANY/0001.patch -git apply $cvePatches/CVE-2017-0611/3.4/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0751/ANY/0001.patch -git apply $cvePatches/CVE-2017-0786/ANY/0001.patch -git apply $cvePatches/CVE-2017-1000380/^4.11/0001.patch -git apply $cvePatches/CVE-2017-11000/ANY/0002.patch -git apply $cvePatches/CVE-2017-11019/ANY/0001.patch -git apply $cvePatches/CVE-2017-11059/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-13080/ANY/0001.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16525/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-7487/ANY/0001.patch -git apply $cvePatches/CVE-2017-7533/3.4/0001.patch -git apply $cvePatches/CVE-2017-8246/3.4/0002.patch -git apply $cvePatches/CVE-2017-8247/ANY/0001.patch -git apply $cvePatches/CVE-2017-9242/^4.11/0001.patch -git apply $cvePatches/CVE-2017-9684/ANY/0001.patch -git apply $cvePatches/CVE-2017-9706/ANY/0001.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/oneplus/msm8974" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9880/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2443/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0510/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0610/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-11000/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-11019/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11059/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-13080/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7533/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch +git apply $cvePatchesLinux/CVE-2017-8247/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9242/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-9684/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-9706/ANY/0001.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_jf.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_jf.sh index f2d64bc1..f6cba021 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_jf.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_jf.sh @@ -1,49 +1,50 @@ #!/bin/bash -cd $base"kernel/samsung/jf" -git apply $cvePatches/CVE-2016-0801/ANY/0001.patch -git apply $cvePatches/CVE-2016-10233/ANY/0001.patch -git apply $cvePatches/CVE-2016-2185/ANY/0001.patch -git apply $cvePatches/CVE-2016-2186/ANY/0001.patch -git apply $cvePatches/CVE-2016-2475/ANY/0001.patch -git apply $cvePatches/CVE-2016-3854/ANY/0001.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-3865/ANY/0001.patch -git apply $cvePatches/CVE-2016-3894/ANY/0001.patch -git apply $cvePatches/CVE-2016-6672/ANY/0001.patch -git apply $cvePatches/CVE-2016-6791/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-8402/3.4/0001.patch -git apply $cvePatches/CVE-2016-8404/ANY/0001.patch -git apply $cvePatches/CVE-2017-0430/ANY/0001.patch -git apply $cvePatches/CVE-2017-0524/ANY/0001.patch -git apply $cvePatches/CVE-2017-0573/ANY/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0706/ANY/0001.patch -git apply $cvePatches/CVE-2017-0710/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0751/ANY/0001.patch -git apply $cvePatches/CVE-2017-0786/ANY/0001.patch -git apply $cvePatches/CVE-2017-0791/ANY/0001.patch -git apply $cvePatches/CVE-2017-1000380/^4.11/0001.patch -git apply $cvePatches/CVE-2017-11015/prima/0001.patch -git apply $cvePatches/CVE-2017-11015/prima/0002.patch -git apply $cvePatches/CVE-2017-11089/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-12153/3.2-^3.16/0001.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16525/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-5970/^4.9/0001.patch -git apply $cvePatches/CVE-2017-7487/ANY/0001.patch -git apply $cvePatches/CVE-2017-8254/3.4/0001.patch -git apply $cvePatches/CVE-2017-8254/3.4/0002.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/samsung/jf" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-0801/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10233/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3854/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3865/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3894/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6672/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6791/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-8402/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2016-8404/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0430/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0524/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0573/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0706/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0751/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0791/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-11015/prima/0001.patch +git apply $cvePatchesLinux/CVE-2017-11015/prima/0002.patch +git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-12153/3.2-^3.16/0001.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-5970/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_msm8974.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_msm8974.sh index efe9345b..a3d316d9 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_msm8974.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_msm8974.sh @@ -1,21 +1,22 @@ #!/bin/bash -cd $base"kernel/samsung/msm8974" -git apply $cvePatches/CVE-2016-2475/ANY/0001.patch -git apply $cvePatches/CVE-2016-4578/ANY/0001.patch -git apply $cvePatches/CVE-2017-0611/3.4/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-16525/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-8246/3.4/0002.patch -git apply $cvePatches/CVE-2017-8254/3.4/0001.patch -git apply $cvePatches/CVE-2017-8254/3.4/0002.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/samsung/msm8974" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2475/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-4578/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0611/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-8246/3.4/0002.patch +git apply $cvePatchesLinux/CVE-2017-8254/3.4/0001.patch +git apply $cvePatchesLinux/CVE-2017-8254/3.4/0002.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh index 9db99337..6fab3e4a 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh @@ -1,44 +1,44 @@ #!/bin/bash -cd $base"kernel/samsung/smdk4412" -git apply $cvePatches/CVE-2014-1739/ANY/0001.patch -git apply $cvePatches/CVE-2014-3153/ANY/0004.patch -git apply $cvePatches/CVE-2014-4656/ANY/0001.patch -git apply $cvePatches/CVE-2014-9420/ANY/0001.patch -git apply $cvePatches/CVE-2014-9781/ANY/0001.patch -git apply $cvePatches/CVE-2014-9870/ANY/0001.patch -git apply $cvePatches/CVE-2014-9895/ANY/0001.patch -git apply $cvePatches/CVE-2014-9900/ANY/0001.patch -git apply $cvePatches/CVE-2015-6640/ANY/0001.patch -git apply $cvePatches/CVE-2015-8944/ANY/0001.patch -git apply $cvePatches/CVE-2016-2185/ANY/0001.patch -git apply $cvePatches/CVE-2016-2186/ANY/0001.patch -git apply $cvePatches/CVE-2016-2544/ANY/0001.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-6753/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-8463/ANY/0001.patch -git apply $cvePatches/CVE-2016-9604/ANY/0001.patch -git apply $cvePatches/CVE-2017-0403/3.0-^3.18/0001.patch -git apply $cvePatches/CVE-2017-0404/^3.18/0001.patch -git apply $cvePatches/CVE-2017-0430/ANY/0001.patch -git apply $cvePatches/CVE-2017-0648/ANY/0001.patch -git apply $cvePatches/CVE-2017-0706/ANY/0001.patch -git apply $cvePatches/CVE-2017-0786/ANY/0001.patch -git apply $cvePatches/CVE-2017-1000380/^4.11/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-15265/^4.14/0001.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-6074/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-7184/ANY/0001.patch -git apply $cvePatches/CVE-2017-7184/ANY/0002.patch -git apply $cvePatches/CVE-2017-7308/ANY/0003.patch -git apply $cvePatches/CVE-2017-7487/ANY/0001.patch +cd $base"kernel/kernel/samsung/smdk4412" +git apply $cvePatchesLinux/CVE-2014-1739/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-3153/ANY/0004.patch +git apply $cvePatchesLinux/CVE-2014-4656/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9420/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9781/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9870/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9895/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-6640/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8944/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2544/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-6753/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-8463/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0403/3.0-^3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0430/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0648/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0706/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0786/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-15265/^4.14/0001.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-6074/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-7184/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7184/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch cd $base diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh index 3e5b9369..5702db50 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh @@ -1,130 +1,130 @@ #!/bin/bash -cd $base"kernel/samsung/universal8890" -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0018.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0020.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0021.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0022.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0024.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0025.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0026.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0027.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0030.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0031.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0032.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0033.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0034.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0035.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0037.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0040.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0042.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0044.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0045.patch -git apply $cvePatches/0002-Copperhead-Kernel_Hardening/3.18/0049.patch -git apply $cvePatches/CVE-2013-7446/^4.3/0003.patch -git apply $cvePatches/CVE-2014-9900/ANY/0001.patch -git apply $cvePatches/CVE-2014-9940/ANY/0001.patch -git apply $cvePatches/CVE-2015-1420/3.2-^3.19/0001.patch -git apply $cvePatches/CVE-2015-2041/^3.19/0002.patch -git apply $cvePatches/CVE-2015-7515/^4.4/0002.patch -git apply $cvePatches/CVE-2015-7550/^4.3/0001.patch -git apply $cvePatches/CVE-2015-8019/3.18/0002.patch -git apply $cvePatches/CVE-2015-8575/ANY/0001.patch -git apply $cvePatches/CVE-2015-8785/ANY/0001.patch -git apply $cvePatches/CVE-2015-8839/ANY/0002.patch -git apply $cvePatches/CVE-2015-8962/ANY/0001.patch -git apply $cvePatches/CVE-2015-8966/3.15+/0001.patch -git apply $cvePatches/CVE-2015-9004/ANY/0001.patch -git apply $cvePatches/CVE-2016-10044/3.18/0002.patch -git apply $cvePatches/CVE-2016-10088/ANY/0001.patch -git apply $cvePatches/CVE-2016-10200/ANY/0001.patch -git apply $cvePatches/CVE-2016-2185/ANY/0001.patch -git apply $cvePatches/CVE-2016-2186/ANY/0001.patch -git apply $cvePatches/CVE-2016-2187/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0001.patch -git apply $cvePatches/CVE-2016-2188/ANY/0002.patch -git apply $cvePatches/CVE-2016-3136/ANY/0001.patch -git apply $cvePatches/CVE-2016-3137/ANY/0001.patch -git apply $cvePatches/CVE-2016-3140/ANY/0001.patch -git apply $cvePatches/CVE-2016-3156/ANY/0001.patch -git apply $cvePatches/CVE-2016-3689/ANY/0001.patch -git apply $cvePatches/CVE-2016-3775/3.18/0004.patch -git apply $cvePatches/CVE-2016-3857/ANY/0001.patch -git apply $cvePatches/CVE-2016-4794/3.18+/0001.patch -git apply $cvePatches/CVE-2016-4794/3.18+/0002.patch -git apply $cvePatches/CVE-2016-6828/ANY/0001.patch -git apply $cvePatches/CVE-2016-7042/ANY/0001.patch -git apply $cvePatches/CVE-2016-7117/^4.5/0002.patch -git apply $cvePatches/CVE-2016-7913/ANY/0001.patch -git apply $cvePatches/CVE-2016-7917/ANY/0001.patch -git apply $cvePatches/CVE-2016-8399/ANY/0001.patch -git apply $cvePatches/CVE-2016-8468/3.18/0001.patch -git apply $cvePatches/CVE-2016-8650/ANY/0001.patch -git apply $cvePatches/CVE-2016-9191/3.11-^4.8/0001.patch -git apply $cvePatches/CVE-2016-9604/ANY/0001.patch -git apply $cvePatches/CVE-2016-9754/ANY/0001.patch -git apply $cvePatches/CVE-2016-9793/ANY/0001.patch -git apply $cvePatches/CVE-2016-9794/ANY/0001.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0003.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0006.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0007.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0008.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0009.patch -git apply $cvePatches/CVE-2016-GadgetFS/ANY/0010.patch -git apply $cvePatches/CVE-2017-0403/3.0-^3.18/0001.patch -git apply $cvePatches/CVE-2017-0404/^3.18/0001.patch -git apply $cvePatches/CVE-2017-0510/3.18/0003.patch -git apply $cvePatches/CVE-2017-0523/3.18/0001.patch -git apply $cvePatches/CVE-2017-0537/ANY/0001.patch -git apply $cvePatches/CVE-2017-0627/ANY/0001.patch -git apply $cvePatches/CVE-2017-0710/ANY/0001.patch -git apply $cvePatches/CVE-2017-0749/ANY/0001.patch -git apply $cvePatches/CVE-2017-0750/ANY/0001.patch -git apply $cvePatches/CVE-2017-0866/3.18/0001.patch -git apply $cvePatches/CVE-2017-1000380/^4.11/0001.patch -git apply $cvePatches/CVE-2017-10996/ANY/0001.patch -git apply $cvePatches/CVE-2017-11089/ANY/0001.patch -git apply $cvePatches/CVE-2017-11090/ANY/0001.patch -git apply $cvePatches/CVE-2017-15868/ANY/0001.patch -git apply $cvePatches/CVE-2017-16525/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16526/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16529/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16530/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16531/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16532/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16533/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16535/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16537/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0001.patch -git apply $cvePatches/CVE-2017-16538/^4.13/0002.patch -git apply $cvePatches/CVE-2017-16643/3.5+/0001.patch -git apply $cvePatches/CVE-2017-16645/ANY/0001.patch -git apply $cvePatches/CVE-2017-16646/ANY/0001.patch -git apply $cvePatches/CVE-2017-16650/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0001.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0005.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0006.patch -git apply $cvePatches/CVE-2017-16USB/ANY/0009.patch -git apply $cvePatches/CVE-2017-2671/^4.10/0001.patch -git apply $cvePatches/CVE-2017-5669/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5970/^4.9/0001.patch -git apply $cvePatches/CVE-2017-5972/ANY/0002.patch -git apply $cvePatches/CVE-2017-5986/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6001/^4.9/0002.patch -git apply $cvePatches/CVE-2017-6345/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6346/3.18/0001.patch -git apply $cvePatches/CVE-2017-6348/^4.9/0001.patch -git apply $cvePatches/CVE-2017-6353/^4.10/0001.patch -git apply $cvePatches/CVE-2017-7308/ANY/0003.patch -git apply $cvePatches/CVE-2017-7472/ANY/0001.patch -git apply $cvePatches/CVE-2017-7487/ANY/0001.patch -git apply $cvePatches/CVE-2017-7495/3.18/0001.patch -git apply $cvePatches/CVE-2017-7495/3.18/0002.patch -git apply $cvePatches/CVE-2017-7616/^4.10/0001.patch -git apply $cvePatches/CVE-2017-7618/^4.10/0002.patch -git apply $cvePatches/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch -git apply $cvePatches/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch -git apply $cvePatches/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch -git apply $cvePatches/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch -git apply $cvePatches/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch -git apply $cvePatches/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch +cd $base"kernel/kernel/samsung/universal8890" +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0019.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0021.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0022.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0023.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0025.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0026.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0027.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0028.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0031.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0032.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0033.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0034.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0035.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0036.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0038.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0041.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0043.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0045.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0046.patch +git apply $cvePatchesLinux/0002-Copperhead-Kernel_Hardening/3.18/0050.patch +git apply $cvePatchesLinux/CVE-2013-7446/^4.3/0003.patch +git apply $cvePatchesLinux/CVE-2014-9900/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2014-9940/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-1420/3.2-^3.19/0001.patch +git apply $cvePatchesLinux/CVE-2015-2041/^3.19/0002.patch +git apply $cvePatchesLinux/CVE-2015-7515/^4.4/0002.patch +git apply $cvePatchesLinux/CVE-2015-7550/^4.3/0001.patch +git apply $cvePatchesLinux/CVE-2015-8019/3.18/0002.patch +git apply $cvePatchesLinux/CVE-2015-8575/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8785/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8839/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2015-8962/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2015-8966/3.15+/0001.patch +git apply $cvePatchesLinux/CVE-2015-9004/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10044/3.18/0002.patch +git apply $cvePatchesLinux/CVE-2016-10088/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-10200/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2185/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2186/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2187/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-2188/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2016-3136/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3137/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3140/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3156/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3689/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-3775/3.18/0004.patch +git apply $cvePatchesLinux/CVE-2016-3857/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-4794/3.18+/0001.patch +git apply $cvePatchesLinux/CVE-2016-4794/3.18+/0002.patch +git apply $cvePatchesLinux/CVE-2016-6828/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7042/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7117/^4.5/0002.patch +git apply $cvePatchesLinux/CVE-2016-7913/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-7917/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8399/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-8468/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2016-8650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9191/3.11-^4.8/0001.patch +git apply $cvePatchesLinux/CVE-2016-9604/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9754/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9793/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-9794/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0007.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0008.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0009.patch +git apply $cvePatchesLinux/CVE-2016-GadgetFS/ANY/0010.patch +git apply $cvePatchesLinux/CVE-2017-0403/3.0-^3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0404/^3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0510/3.18/0003.patch +git apply $cvePatchesLinux/CVE-2017-0523/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-0537/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0627/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0710/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0749/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0750/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-0866/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-1000380/^4.11/0001.patch +git apply $cvePatchesLinux/CVE-2017-10996/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11089/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-11090/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-15868/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16525/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16526/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16529/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16530/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16531/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16532/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16533/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16535/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16537/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0001.patch +git apply $cvePatchesLinux/CVE-2017-16538/^4.13/0002.patch +git apply $cvePatchesLinux/CVE-2017-16643/3.5+/0001.patch +git apply $cvePatchesLinux/CVE-2017-16645/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16646/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16650/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0005.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0006.patch +git apply $cvePatchesLinux/CVE-2017-16USB/ANY/0009.patch +git apply $cvePatchesLinux/CVE-2017-2671/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-5669/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5970/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-5972/ANY/0002.patch +git apply $cvePatchesLinux/CVE-2017-5986/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6001/^4.9/0002.patch +git apply $cvePatchesLinux/CVE-2017-6345/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6346/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-6348/^4.9/0001.patch +git apply $cvePatchesLinux/CVE-2017-6353/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-7308/ANY/0003.patch +git apply $cvePatchesLinux/CVE-2017-7472/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7487/ANY/0001.patch +git apply $cvePatchesLinux/CVE-2017-7495/3.18/0001.patch +git apply $cvePatchesLinux/CVE-2017-7495/3.18/0002.patch +git apply $cvePatchesLinux/CVE-2017-7616/^4.10/0001.patch +git apply $cvePatchesLinux/CVE-2017-7618/^4.10/0002.patch +git apply $cvePatchesLinux/Untracked/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch +git apply $cvePatchesLinux/Untracked/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch +git apply $cvePatchesLinux/Untracked/ANY/0004-net-add-recursion-limit-to-GRO.patch +git apply $cvePatchesLinux/Untracked/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch +git apply $cvePatchesLinux/Untracked/ANY/0007-USB-usbip-fix-potential-out-of-bounds-write.patch +git apply $cvePatchesLinux/Untracked/ANY/0008-nfsd-check-for-oversized-NFSv2-v3-arguments.patch cd $base