mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-11-29 11:46:48 -05:00
Update CVE patchers
Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
parent
68771721d5
commit
e08349a202
80 changed files with 324 additions and 80 deletions
|
|
@ -582,14 +582,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p591"
|
||||
editKernelLocalversion "-dos.p593"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -362,12 +362,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
|||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0008.patch
|
||||
|
|
@ -382,5 +384,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p382"
|
||||
editKernelLocalversion "-dos.p384"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -423,6 +423,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch
|
||||
|
|
@ -435,6 +437,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
|
|
@ -442,5 +445,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p442"
|
||||
editKernelLocalversion "-dos.p445"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -280,12 +280,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.9/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.9/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.9/0010.patch
|
||||
|
|
@ -308,6 +310,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.9/0005.patch
|
||||
|
|
@ -339,8 +342,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.9/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p342"
|
||||
editKernelLocalversion "-dos.p347"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -426,13 +426,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
|||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p434"
|
||||
editKernelLocalversion "-dos.p436"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -422,11 +422,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30262/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0057.patch
|
||||
|
|
@ -457,5 +459,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0032.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch
|
||||
editKernelLocalversion "-dos.p457"
|
||||
editKernelLocalversion "-dos.p459"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -416,12 +416,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
|||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0011.patch
|
||||
|
|
@ -435,5 +437,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
editKernelLocalversion "-dos.p435"
|
||||
editKernelLocalversion "-dos.p437"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -349,13 +349,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
|||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p357"
|
||||
editKernelLocalversion "-dos.p359"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -520,6 +520,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch
|
||||
|
|
@ -533,10 +535,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p538"
|
||||
editKernelLocalversion "-dos.p541"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -350,13 +350,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
|||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p358"
|
||||
editKernelLocalversion "-dos.p360"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -321,10 +321,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.19/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3744/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4135/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20177/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.19/0004.patch
|
||||
|
|
@ -352,6 +356,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.19/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.19/0003.patch
|
||||
|
|
@ -395,6 +400,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-41864/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42252/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43975/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc/^5.13/0001.patch
|
||||
|
|
@ -405,5 +412,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
editKernelLocalversion "-dos.p405"
|
||||
editKernelLocalversion "-dos.p412"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -385,10 +385,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.14/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14/0002.patch
|
||||
|
|
@ -408,6 +411,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.14/0002.patch
|
||||
|
|
@ -439,10 +443,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-41864/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42252/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p444"
|
||||
editKernelLocalversion "-dos.p450"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -130,10 +130,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.14/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3744/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14/0002.patch
|
||||
|
|
@ -156,6 +159,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.14/0002.patch
|
||||
|
|
@ -191,6 +195,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-41864/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42252/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
editKernelLocalversion "-dos.p192"
|
||||
editKernelLocalversion "-dos.p199"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -252,6 +252,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0013.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/4.4/0007.patch
|
||||
|
|
@ -275,6 +276,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch
|
||||
|
|
@ -293,8 +296,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
|
||||
editKernelLocalversion "-dos.p296"
|
||||
editKernelLocalversion "-dos.p302"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
|
|
@ -258,6 +258,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0013.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/^5.15/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/4.4/0007.patch
|
||||
|
|
@ -281,6 +282,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch
|
||||
|
|
@ -299,9 +302,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
|
||||
editKernelLocalversion "-dos.p303"
|
||||
editKernelLocalversion "-dos.p309"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue