mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-12-24 23:19:31 -05:00
Update CVE patchers
This fixes CVE-2018-9422 which was primarily added via b56fabac
May still need to be fixed:
16.0/kernel_google_yellowstone
16.0/kernel_xiaomi_msm8937
Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
parent
7f24df22f7
commit
c4fe56a307
@ -1 +1 @@
|
||||
Subproject commit 0c4313b2cf1d06442b5f271c10a2893799873c1e
|
||||
Subproject commit 7715533ef0d4fc37073595c407e171f17653131f
|
@ -768,6 +768,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
@ -782,5 +783,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p782"
|
||||
editKernelLocalversion "-dos.p783"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -218,7 +218,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
||||
@ -429,6 +431,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
@ -437,5 +440,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-sy
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p437"
|
||||
editKernelLocalversion "-dos.p440"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -224,7 +224,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
||||
@ -465,6 +467,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
@ -474,5 +477,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p474"
|
||||
editKernelLocalversion "-dos.p477"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -508,6 +508,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
@ -515,5 +516,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p515"
|
||||
editKernelLocalversion "-dos.p516"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -590,11 +590,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p596"
|
||||
editKernelLocalversion "-dos.p597"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -631,9 +631,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directo
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p635"
|
||||
editKernelLocalversion "-dos.p636"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -294,7 +294,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
||||
@ -537,6 +539,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
@ -546,5 +549,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p546"
|
||||
editKernelLocalversion "-dos.p549"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -108,7 +108,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/^4.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/^4.13/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
@ -224,10 +224,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
editKernelLocalversion "-dos.p229"
|
||||
editKernelLocalversion "-dos.p230"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -135,7 +135,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch
|
||||
@ -343,6 +345,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
@ -350,5 +353,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p350"
|
||||
editKernelLocalversion "-dos.p353"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -243,8 +243,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch
|
||||
@ -400,11 +401,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p406"
|
||||
editKernelLocalversion "-dos.p408"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -239,8 +239,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch
|
||||
@ -394,11 +395,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p400"
|
||||
editKernelLocalversion "-dos.p402"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -353,8 +353,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch
|
||||
@ -728,6 +729,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
@ -738,5 +740,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p738"
|
||||
editKernelLocalversion "-dos.p740"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -607,11 +607,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p613"
|
||||
editKernelLocalversion "-dos.p614"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -403,9 +403,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=dr
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p407"
|
||||
editKernelLocalversion "-dos.p408"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -344,8 +344,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8897/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
@ -669,6 +670,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.9/0004.patch
|
||||
@ -686,6 +688,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
|
||||
@ -700,5 +703,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p700"
|
||||
editKernelLocalversion "-dos.p703"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -174,7 +174,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
@ -420,6 +422,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
@ -430,5 +433,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p430"
|
||||
editKernelLocalversion "-dos.p433"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -176,7 +176,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
@ -398,10 +399,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p403"
|
||||
editKernelLocalversion "-dos.p405"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -276,7 +276,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
@ -520,6 +521,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
@ -527,5 +529,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p527"
|
||||
editKernelLocalversion "-dos.p529"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -273,7 +273,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
@ -535,6 +536,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directo
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
@ -542,5 +544,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p542"
|
||||
editKernelLocalversion "-dos.p544"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -617,6 +617,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
@ -627,5 +628,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p627"
|
||||
editKernelLocalversion "-dos.p628"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -147,7 +147,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9463/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch
|
||||
@ -581,6 +582,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
@ -588,5 +590,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p588"
|
||||
editKernelLocalversion "-dos.p590"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -300,11 +300,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p306"
|
||||
editKernelLocalversion "-dos.p307"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -423,9 +423,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directo
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p427"
|
||||
editKernelLocalversion "-dos.p428"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -207,8 +207,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9465/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch
|
||||
@ -672,6 +673,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
@ -681,5 +683,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p681"
|
||||
editKernelLocalversion "-dos.p683"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -399,9 +399,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=dr
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p403"
|
||||
editKernelLocalversion "-dos.p404"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -132,6 +132,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
@ -390,6 +391,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
|
||||
@ -400,5 +402,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p400"
|
||||
editKernelLocalversion "-dos.p402"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -221,7 +221,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch
|
||||
@ -451,9 +451,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p455"
|
||||
editKernelLocalversion "-dos.p456"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -617,6 +617,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
@ -627,5 +628,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p627"
|
||||
editKernelLocalversion "-dos.p628"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -83,7 +83,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/^4.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/^4.13/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
@ -255,6 +255,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
@ -262,5 +263,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p262"
|
||||
editKernelLocalversion "-dos.p263"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -110,7 +110,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch
|
||||
@ -445,6 +445,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
@ -453,5 +454,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p453"
|
||||
editKernelLocalversion "-dos.p454"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -399,9 +399,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=dr
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p403"
|
||||
editKernelLocalversion "-dos.p404"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -226,7 +226,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
@ -454,10 +455,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=dr
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p459"
|
||||
editKernelLocalversion "-dos.p461"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -370,9 +370,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directo
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p374"
|
||||
editKernelLocalversion "-dos.p375"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -162,7 +162,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.18/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch
|
||||
@ -591,6 +592,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
@ -599,5 +601,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p599"
|
||||
editKernelLocalversion "-dos.p601"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -371,9 +371,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directo
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p375"
|
||||
editKernelLocalversion "-dos.p376"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -471,6 +471,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -478,12 +479,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.19/0003.patch
|
||||
@ -534,6 +537,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch
|
||||
@ -544,5 +549,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
editKernelLocalversion "-dos.p544"
|
||||
editKernelLocalversion "-dos.p549"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -351,11 +351,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.9/0004.patch
|
||||
@ -388,6 +390,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
@ -395,5 +399,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p395"
|
||||
editKernelLocalversion "-dos.p399"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -268,6 +268,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2977/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -275,11 +276,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.14/0002.patch
|
||||
@ -323,9 +326,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
editKernelLocalversion "-dos.p327"
|
||||
editKernelLocalversion "-dos.p332"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -347,6 +347,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
@ -382,6 +383,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
@ -390,5 +392,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p390"
|
||||
editKernelLocalversion "-dos.p392"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -8,7 +8,6 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
|
||||
@ -46,11 +45,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7916/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8391/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
|
||||
@ -101,6 +99,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
@ -126,19 +126,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2324/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch
|
||||
@ -156,18 +149,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/3.4/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10751/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch
|
||||
@ -179,6 +167,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.4/0019.patch
|
||||
@ -192,10 +181,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0920/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0929/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch
|
||||
@ -203,10 +188,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/3.4/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/3.4/0023.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/3.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/3.4/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
@ -215,16 +196,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30262/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/3.4/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39686/3.4/0027.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39686/3.4/0028.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39686/3.4/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39686/3.4/0030.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
@ -236,25 +210,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1836/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
editKernelLocalversion "-dos.p256"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
editKernelLocalversion "-dos.p216"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -145,7 +145,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5863/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11980/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch
|
||||
@ -488,6 +489,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
@ -499,5 +501,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p499"
|
||||
editKernelLocalversion "-dos.p501"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -170,7 +170,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
||||
@ -387,6 +389,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
@ -397,5 +400,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p397"
|
||||
editKernelLocalversion "-dos.p400"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -211,7 +211,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
||||
@ -491,6 +493,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
|
||||
@ -501,5 +504,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p501"
|
||||
editKernelLocalversion "-dos.p504"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -162,6 +162,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9465-alt/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9465-alt/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9465-alt/3.4/0003.patch
|
||||
@ -417,6 +419,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
@ -426,5 +429,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p426"
|
||||
editKernelLocalversion "-dos.p429"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -16,6 +16,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18193/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch
|
||||
@ -35,9 +36,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
editKernelLocalversion "-dos.p39"
|
||||
editKernelLocalversion "-dos.p41"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -155,6 +155,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
@ -402,6 +404,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
|
||||
@ -411,5 +414,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p411"
|
||||
editKernelLocalversion "-dos.p414"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -138,7 +138,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9463/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch
|
||||
@ -569,6 +570,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
@ -576,5 +578,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p576"
|
||||
editKernelLocalversion "-dos.p578"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -279,11 +279,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p285"
|
||||
editKernelLocalversion "-dos.p286"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -227,7 +227,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
@ -468,6 +470,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
@ -478,5 +481,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-sy
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p478"
|
||||
editKernelLocalversion "-dos.p481"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -417,9 +417,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directo
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p421"
|
||||
editKernelLocalversion "-dos.p422"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -129,7 +129,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.18/0002.patch
|
||||
@ -490,6 +491,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
@ -498,5 +500,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p498"
|
||||
editKernelLocalversion "-dos.p500"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -193,6 +193,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
@ -344,6 +345,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=dr
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
@ -351,5 +353,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
editKernelLocalversion "-dos.p351"
|
||||
editKernelLocalversion "-dos.p353"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -207,6 +207,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
||||
@ -424,6 +425,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
@ -436,5 +438,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p436"
|
||||
editKernelLocalversion "-dos.p438"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -279,6 +279,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
||||
@ -502,6 +503,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
@ -514,5 +516,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p514"
|
||||
editKernelLocalversion "-dos.p516"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -101,6 +101,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
@ -230,11 +231,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
editKernelLocalversion "-dos.p236"
|
||||
editKernelLocalversion "-dos.p238"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -75,6 +75,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
|
||||
@ -117,9 +118,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p121"
|
||||
editKernelLocalversion "-dos.p123"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -337,6 +337,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
@ -378,6 +379,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
@ -387,5 +389,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p387"
|
||||
editKernelLocalversion "-dos.p389"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -125,6 +125,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
|
||||
@ -140,9 +141,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25664/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25724/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25743/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26490/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch
|
||||
@ -159,8 +157,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p162"
|
||||
editKernelLocalversion "-dos.p161"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,5 +1,6 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/fairphone/sdm632"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0332-0333.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch
|
||||
@ -66,6 +67,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
@ -78,7 +80,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p80"
|
||||
editKernelLocalversion "-dos.p83"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -272,6 +272,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2977/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -279,12 +280,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.19/0003.patch
|
||||
@ -326,11 +329,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
editKernelLocalversion "-dos.p332"
|
||||
editKernelLocalversion "-dos.p337"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -77,6 +77,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
|
||||
@ -115,8 +116,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p118"
|
||||
editKernelLocalversion "-dos.p120"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -118,6 +118,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2977/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -126,11 +127,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.14/0002.patch
|
||||
@ -170,8 +173,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p173"
|
||||
editKernelLocalversion "-dos.p178"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,6 +1,7 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/google/msm-4.9"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0328-0329.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0332-0333.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch
|
||||
@ -69,6 +70,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
@ -84,7 +86,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25664/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p86"
|
||||
editKernelLocalversion "-dos.p89"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -117,6 +117,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2977/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -125,12 +126,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.19/0003.patch
|
||||
@ -177,8 +180,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p180"
|
||||
editKernelLocalversion "-dos.p185"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -99,6 +99,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
|
||||
@ -141,10 +142,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0002.patch
|
||||
editKernelLocalversion "-dos.p146"
|
||||
editKernelLocalversion "-dos.p148"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -78,6 +78,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
|
||||
@ -116,8 +117,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p119"
|
||||
editKernelLocalversion "-dos.p121"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -311,16 +311,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.9/0004.patch
|
||||
@ -353,10 +356,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p358"
|
||||
editKernelLocalversion "-dos.p363"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -336,6 +336,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -343,11 +344,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.14/0002.patch
|
||||
@ -384,11 +387,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.14/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p390"
|
||||
editKernelLocalversion "-dos.p395"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -298,6 +298,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2977/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -305,12 +306,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.19/0003.patch
|
||||
@ -362,6 +365,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch
|
||||
@ -369,5 +374,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22095/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p369"
|
||||
editKernelLocalversion "-dos.p374"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -52,6 +52,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2503/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2586/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2602/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -61,6 +62,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3535/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/5.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/5.4/0013.patch
|
||||
@ -68,11 +70,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3633/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3903/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/5.4/0007.patch
|
||||
@ -94,6 +98,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41222/5.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41674/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42720/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42721/5.4/0004.patch
|
||||
@ -102,5 +108,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-MiscWireless/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-MiscWireless/^6.0/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-MiscWireless/^6.0/0004.patch
|
||||
editKernelLocalversion "-dos.p102"
|
||||
editKernelLocalversion "-dos.p108"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -76,6 +76,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
|
||||
@ -118,10 +119,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0002.patch
|
||||
editKernelLocalversion "-dos.p123"
|
||||
editKernelLocalversion "-dos.p125"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -2,6 +2,7 @@
|
||||
cd "$DOS_BUILD_BASE""kernel/razer/sdm845"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0318-0319.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0322-0323.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0332-0333.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch
|
||||
@ -73,6 +74,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
@ -103,8 +105,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p106"
|
||||
editKernelLocalversion "-dos.p109"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -80,6 +80,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
|
||||
@ -122,10 +123,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0002.patch
|
||||
editKernelLocalversion "-dos.p127"
|
||||
editKernelLocalversion "-dos.p129"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -315,16 +315,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.9/0004.patch
|
||||
@ -357,10 +360,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p362"
|
||||
editKernelLocalversion "-dos.p367"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,6 +1,7 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/xiaomi/sdm845"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0328-0329.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0332-0333.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch
|
||||
@ -65,6 +66,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
@ -79,7 +81,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p81"
|
||||
editKernelLocalversion "-dos.p84"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -363,6 +363,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -370,11 +371,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.14/0002.patch
|
||||
@ -416,6 +419,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.14/0002.patch
|
||||
@ -423,5 +428,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p423"
|
||||
editKernelLocalversion "-dos.p428"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -412,6 +412,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -419,12 +420,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.19/0003.patch
|
||||
@ -476,6 +479,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch
|
||||
@ -486,5 +491,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22095/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p486"
|
||||
editKernelLocalversion "-dos.p491"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -272,6 +272,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2977/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -279,12 +280,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.19/0003.patch
|
||||
@ -323,11 +326,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
editKernelLocalversion "-dos.p329"
|
||||
editKernelLocalversion "-dos.p334"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -77,6 +77,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
|
||||
@ -115,8 +116,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p118"
|
||||
editKernelLocalversion "-dos.p120"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -88,6 +88,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -95,11 +96,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.14/0002.patch
|
||||
@ -120,8 +123,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p123"
|
||||
editKernelLocalversion "-dos.p128"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,5 +1,6 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/google/msm-4.9"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0332-0333.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch
|
||||
@ -70,18 +71,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25664/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p83"
|
||||
editKernelLocalversion "-dos.p75"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -88,22 +88,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3903/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20382/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.19/0003.patch
|
||||
@ -123,8 +127,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p126"
|
||||
editKernelLocalversion "-dos.p132"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -99,6 +99,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
|
||||
@ -141,10 +142,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0002.patch
|
||||
editKernelLocalversion "-dos.p146"
|
||||
editKernelLocalversion "-dos.p148"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -78,6 +78,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch
|
||||
@ -96,8 +97,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25654/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25664/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25743/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
@ -113,6 +112,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
|
@ -311,16 +311,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.9/0004.patch
|
||||
@ -353,10 +356,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p358"
|
||||
editKernelLocalversion "-dos.p363"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -336,6 +336,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -343,11 +344,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.14/0002.patch
|
||||
@ -384,11 +387,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.14/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p390"
|
||||
editKernelLocalversion "-dos.p395"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -298,6 +298,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2977/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -305,12 +306,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3239/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.19/0003.patch
|
||||
@ -362,6 +365,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch
|
||||
@ -369,5 +374,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22095/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p369"
|
||||
editKernelLocalversion "-dos.p374"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,8 +1,5 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/oneplus/sm8350"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/5.4/5.4.0198-0199.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/5.4/5.4.0202-0203.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/5.4/5.4.0209-0210.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch
|
||||
@ -21,27 +18,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3669/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3759/5.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/5.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/^5.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/^5.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0480/4.9-^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1012/5.4/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1012/5.4/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1012/5.4/0047.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1012/5.4/0048.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/5.4/0013.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1966/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/5.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/5.4/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2586/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2602/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3303/5.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
@ -49,44 +34,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3535/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3545/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/5.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/5.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3586/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3633/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-21505/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3903/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33741/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33742/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/5.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40307/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41222/5.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41674/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42720/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42721/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-MiscWireless/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-MiscWireless/^6.0/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-MiscWireless/^6.0/0004.patch
|
||||
editKernelLocalversion "-dos.p88"
|
||||
editKernelLocalversion "-dos.p57"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1,5 +1,6 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/razer/sdm845"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0332-0333.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch
|
||||
@ -64,6 +65,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
@ -76,7 +78,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p78"
|
||||
editKernelLocalversion "-dos.p81"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -69,6 +69,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
editKernelLocalversion "-dos.p70"
|
||||
editKernelLocalversion "-dos.p69"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
Loading…
Reference in New Issue
Block a user