mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-08-24 13:59:43 -04:00
Update CVE patchers
This fixes CVE-2018-9422 which was primarily added via b56fabac
May still need to be fixed:
16.0/kernel_google_yellowstone
16.0/kernel_xiaomi_msm8937
Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
parent
7f24df22f7
commit
c4fe56a307
91 changed files with 355 additions and 214 deletions
|
@ -607,11 +607,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p613"
|
||||
editKernelLocalversion "-dos.p614"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -403,9 +403,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=dr
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p407"
|
||||
editKernelLocalversion "-dos.p408"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -344,8 +344,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8897/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
|
@ -669,6 +670,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.9/0004.patch
|
||||
|
@ -686,6 +688,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
|
||||
|
@ -700,5 +703,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p700"
|
||||
editKernelLocalversion "-dos.p703"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -174,7 +174,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
|
@ -420,6 +422,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||
|
@ -430,5 +433,5 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a
|
|||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a523207486701b2d34607137558066f.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p430"
|
||||
editKernelLocalversion "-dos.p433"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -176,7 +176,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
|
@ -398,10 +399,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p403"
|
||||
editKernelLocalversion "-dos.p405"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -276,7 +276,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
|
@ -520,6 +521,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/^5.19/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
|
@ -527,5 +529,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p527"
|
||||
editKernelLocalversion "-dos.p529"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -273,7 +273,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
|
@ -535,6 +536,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directo
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
|
@ -542,5 +544,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p542"
|
||||
editKernelLocalversion "-dos.p544"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -617,6 +617,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||
|
@ -627,5 +628,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
editKernelLocalversion "-dos.p627"
|
||||
editKernelLocalversion "-dos.p628"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -147,7 +147,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9463/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch
|
||||
|
@ -581,6 +582,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
|
@ -588,5 +590,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p588"
|
||||
editKernelLocalversion "-dos.p590"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -300,11 +300,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p306"
|
||||
editKernelLocalversion "-dos.p307"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -423,9 +423,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directo
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p427"
|
||||
editKernelLocalversion "-dos.p428"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -207,8 +207,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/3.18/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9465/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch
|
||||
|
@ -672,6 +673,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
|
@ -681,5 +683,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p681"
|
||||
editKernelLocalversion "-dos.p683"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue