mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-02-22 23:50:09 -05:00
Update CVE patchers
This commit is contained in:
parent
40c356371a
commit
b61264e3b9
@ -1 +1 @@
|
||||
Subproject commit 08ba50a1024b95ddc60b930e9dde2248a8cf584e
|
||||
Subproject commit f87d90ff5f56b5c1f934858592bb3a3f55c6f1ef
|
@ -635,6 +635,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -645,5 +646,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p645"
|
||||
editKernelLocalversion "-dos.p646"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -647,6 +647,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -655,5 +656,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p655"
|
||||
editKernelLocalversion "-dos.p656"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -317,10 +317,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p322"
|
||||
editKernelLocalversion "-dos.p323"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -328,11 +328,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p334"
|
||||
editKernelLocalversion "-dos.p335"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -385,6 +385,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -393,5 +394,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p393"
|
||||
editKernelLocalversion "-dos.p394"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -461,6 +461,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -469,5 +470,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p469"
|
||||
editKernelLocalversion "-dos.p470"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -359,6 +359,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -366,5 +367,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p366"
|
||||
editKernelLocalversion "-dos.p367"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -455,10 +455,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p460"
|
||||
editKernelLocalversion "-dos.p461"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -129,10 +129,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p134"
|
||||
editKernelLocalversion "-dos.p135"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -239,10 +239,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p244"
|
||||
editKernelLocalversion "-dos.p245"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -192,6 +192,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -199,5 +200,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p199"
|
||||
editKernelLocalversion "-dos.p200"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -187,6 +187,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/^5.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -194,5 +195,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p194"
|
||||
editKernelLocalversion "-dos.p195"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -595,6 +595,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch
|
||||
@ -614,6 +615,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
||||
@ -621,6 +623,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/3.18/0008.patch
|
||||
@ -632,5 +635,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p632"
|
||||
editKernelLocalversion "-dos.p635"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -478,6 +478,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -486,5 +487,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-sy
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p486"
|
||||
editKernelLocalversion "-dos.p487"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -250,6 +250,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/^5.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
@ -257,5 +258,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p257"
|
||||
editKernelLocalversion "-dos.p258"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -550,6 +550,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26558/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
|
||||
@ -570,6 +571,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
||||
@ -577,6 +579,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/^5.12/0001.patch
|
||||
@ -593,5 +596,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7542/3.18/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p593"
|
||||
editKernelLocalversion "-dos.p596"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -282,6 +282,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -290,5 +291,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p290"
|
||||
editKernelLocalversion "-dos.p291"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -266,6 +266,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -273,5 +274,5 @@ git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p273"
|
||||
editKernelLocalversion "-dos.p274"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -405,6 +405,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -414,5 +415,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p414"
|
||||
editKernelLocalversion "-dos.p415"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -382,6 +382,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -390,5 +391,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p390"
|
||||
editKernelLocalversion "-dos.p391"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -373,6 +373,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -381,5 +382,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p381"
|
||||
editKernelLocalversion "-dos.p382"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -497,6 +497,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -506,5 +507,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p506"
|
||||
editKernelLocalversion "-dos.p507"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -440,6 +440,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch
|
||||
@ -462,6 +464,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
@ -472,11 +475,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p478"
|
||||
editKernelLocalversion "-dos.p482"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -175,6 +175,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/^5.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
@ -184,5 +185,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p184"
|
||||
editKernelLocalversion "-dos.p185"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -259,11 +259,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/^5.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p265"
|
||||
editKernelLocalversion "-dos.p266"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -230,11 +230,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/^5.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p236"
|
||||
editKernelLocalversion "-dos.p237"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -505,6 +505,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch
|
||||
@ -527,6 +529,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
||||
@ -534,6 +537,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
|
||||
@ -541,5 +545,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p541"
|
||||
editKernelLocalversion "-dos.p545"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -477,6 +477,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -485,5 +486,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-sy
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p485"
|
||||
editKernelLocalversion "-dos.p486"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -275,6 +275,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27675/3.18/0008.patch
|
||||
@ -299,6 +301,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
@ -310,11 +313,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p316"
|
||||
editKernelLocalversion "-dos.p320"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -246,6 +246,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/^5.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
@ -253,5 +254,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p253"
|
||||
editKernelLocalversion "-dos.p254"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -221,9 +221,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p225"
|
||||
editKernelLocalversion "-dos.p226"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -321,11 +321,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p327"
|
||||
editKernelLocalversion "-dos.p328"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -496,6 +496,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -505,5 +506,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p505"
|
||||
editKernelLocalversion "-dos.p506"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -281,6 +281,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.9/0005.patch
|
||||
@ -310,9 +312,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p314"
|
||||
editKernelLocalversion "-dos.p317"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -477,6 +477,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -485,5 +486,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-sy
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p485"
|
||||
editKernelLocalversion "-dos.p486"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -246,6 +246,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/^5.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
@ -253,5 +254,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p253"
|
||||
editKernelLocalversion "-dos.p254"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -208,6 +208,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.9/0005.patch
|
||||
@ -239,9 +241,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p243"
|
||||
editKernelLocalversion "-dos.p246"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -338,6 +338,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27675/3.18/0008.patch
|
||||
@ -362,6 +364,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
@ -373,6 +376,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
|
||||
@ -382,5 +386,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p382"
|
||||
editKernelLocalversion "-dos.p386"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -251,6 +251,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.9/0005.patch
|
||||
@ -282,9 +284,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p286"
|
||||
editKernelLocalversion "-dos.p289"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -321,11 +321,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p327"
|
||||
editKernelLocalversion "-dos.p328"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -324,9 +324,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p328"
|
||||
editKernelLocalversion "-dos.p329"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -208,11 +208,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/^5.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p214"
|
||||
editKernelLocalversion "-dos.p215"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -396,6 +396,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch
|
||||
@ -418,6 +420,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
@ -429,11 +432,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p435"
|
||||
editKernelLocalversion "-dos.p439"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -209,11 +209,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/^5.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p215"
|
||||
editKernelLocalversion "-dos.p216"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -283,6 +283,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3600/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20177/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14-^5.11/0001.patch
|
||||
@ -324,6 +326,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35039/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc/^5.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.19/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch
|
||||
@ -332,5 +335,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p332"
|
||||
editKernelLocalversion "-dos.p335"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -355,6 +355,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.14/0004.patch
|
||||
@ -392,5 +394,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p392"
|
||||
editKernelLocalversion "-dos.p394"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -228,6 +228,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.4/0008.patch
|
||||
@ -257,9 +258,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.4/0004.patch
|
||||
editKernelLocalversion "-dos.p261"
|
||||
editKernelLocalversion "-dos.p263"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -226,6 +226,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.4/0008.patch
|
||||
@ -255,9 +256,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.4/0004.patch
|
||||
editKernelLocalversion "-dos.p259"
|
||||
editKernelLocalversion "-dos.p261"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -98,5 +98,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1955/ANY/0004.patch
|
||||
editKernelLocalversion "-dos.p98"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
editKernelLocalversion "-dos.p100"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -125,9 +125,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p129"
|
||||
editKernelLocalversion "-dos.p130"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,6 +1,5 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/fxtec/msm8998"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0274-0275.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch
|
||||
@ -44,14 +43,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/^5.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.4/0005.patch
|
||||
editKernelLocalversion "-dos.p53"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1955/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
editKernelLocalversion "-dos.p50"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -98,6 +98,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.14/0004.patch
|
||||
@ -133,7 +136,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p135"
|
||||
editKernelLocalversion "-dos.p139"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -113,6 +113,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.9/0005.patch
|
||||
@ -144,7 +146,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p146"
|
||||
editKernelLocalversion "-dos.p149"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -276,6 +276,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -284,5 +285,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p284"
|
||||
editKernelLocalversion "-dos.p285"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -162,6 +162,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.4/0008.patch
|
||||
@ -191,7 +192,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.4/0004.patch
|
||||
editKernelLocalversion "-dos.p193"
|
||||
editKernelLocalversion "-dos.p195"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -321,9 +321,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p325"
|
||||
editKernelLocalversion "-dos.p326"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -252,9 +252,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p256"
|
||||
editKernelLocalversion "-dos.p257"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -289,11 +289,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p295"
|
||||
editKernelLocalversion "-dos.p296"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -248,9 +248,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p252"
|
||||
editKernelLocalversion "-dos.p253"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -428,6 +428,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch
|
||||
@ -450,6 +452,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
@ -460,11 +463,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p466"
|
||||
editKernelLocalversion "-dos.p470"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -163,6 +163,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -171,5 +172,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p171"
|
||||
editKernelLocalversion "-dos.p172"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -316,10 +316,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p321"
|
||||
editKernelLocalversion "-dos.p322"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -256,11 +256,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/^5.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p262"
|
||||
editKernelLocalversion "-dos.p263"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -339,6 +339,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27675/3.18/0008.patch
|
||||
@ -362,6 +364,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
@ -373,11 +376,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p379"
|
||||
editKernelLocalversion "-dos.p383"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -49,8 +49,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.4/0005.patch
|
||||
editKernelLocalversion "-dos.p52"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
editKernelLocalversion "-dos.p51"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -175,6 +175,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.9/0005.patch
|
||||
@ -206,9 +208,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p210"
|
||||
editKernelLocalversion "-dos.p213"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -149,6 +149,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22555/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.14/0004.patch
|
||||
@ -184,10 +187,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p189"
|
||||
editKernelLocalversion "-dos.p193"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -193,9 +193,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p197"
|
||||
editKernelLocalversion "-dos.p198"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -48,8 +48,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1955/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.4/0005.patch
|
||||
editKernelLocalversion "-dos.p51"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
editKernelLocalversion "-dos.p54"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,10 +1,5 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/razer/sdm845"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0269-0270.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0270-0271.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0271-0272.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0273-0274.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0274-0275.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch
|
||||
@ -71,8 +66,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch
|
||||
editKernelLocalversion "-dos.p74"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
editKernelLocalversion "-dos.p68"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -292,6 +292,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -300,5 +301,5 @@ git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p300"
|
||||
editKernelLocalversion "-dos.p301"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -365,6 +365,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
@ -373,5 +374,5 @@ git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p373"
|
||||
editKernelLocalversion "-dos.p374"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -121,9 +121,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
editKernelLocalversion "-dos.p125"
|
||||
editKernelLocalversion "-dos.p126"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,6 +1,5 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/xiaomi/sdm845"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0274-0275.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0007-Accelerated_AES/3.10+/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch
|
||||
@ -67,8 +66,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.7.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch
|
||||
editKernelLocalversion "-dos.p70"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-powerpc-H_RTAS-rets-buffer-overflow/^5.14/0001.patch
|
||||
editKernelLocalversion "-dos.p68"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -114,7 +114,6 @@ patchWorkspace() {
|
||||
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi;
|
||||
|
||||
#source build/envsetup.sh;
|
||||
#repopick -i 312861; #recorder intent improvement
|
||||
|
||||
source "$DOS_SCRIPTS/Patch.sh";
|
||||
source "$DOS_SCRIPTS_COMMON/Copy_Keys.sh";
|
||||
|
Loading…
x
Reference in New Issue
Block a user