mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-05-02 06:26:20 -04:00
Churn
Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
parent
d261ab1107
commit
ec38522af9
13 changed files with 21 additions and 21 deletions
|
@ -71,10 +71,10 @@ commentPatches android_kernel_lge_msm8996.sh "CVE-2016-6198" "CVE-2017-13162/3.1
|
|||
commentPatches android_kernel_moto_shamu.sh "CVE-2014-8559";
|
||||
commentPatches android_kernel_motorola_msm8916.sh "0001-LinuxIncrementals/3.10/3.10.0050-0051.patch" "CVE-2014-8559" "CVE-2017-15817" "CVE-2018-9514";
|
||||
commentPatches android_kernel_motorola_msm8974.sh "CVE-2016-5696" "CVE-2017-7373" "CVE-2017-17770/3.4/0002.patch" "CVE-2019-11599" "CVE-2022-22058";
|
||||
commentPatches android_kernel_motorola_msm8992.sh "CVE-2017-5551/3.10/0002.patch" "CVE-2017-14880/3.10/0001.patch" "CVE-2017-17770/3.4" "CVE-2018-3585/3.10/0001.patch" "CVE-2019-2297/qcacld-2.0/0001.patch";
|
||||
commentPatches android_kernel_motorola_msm8992.sh "CVE-2017-5551/3.10/0002.patch" "CVE-2017-14880/3.10/0001.patch" "CVE-2017-17770/3.4" "CVE-2018-3585/3.10/0001.patch" "CVE-2019-2297/qcacld-2.0/0001.patch" "0002-Misc_Fixes-uid/3.10/0002-alt1.patch" "CVE-2017-17712/3.10/0010.patch";
|
||||
commentPatches android_kernel_motorola_msm8996.sh "0001-LinuxIncrementals/3.18/3.18.0098-0099.patch" "CVE-2017-8266" "CVE-2017-13162/3.18/0001.patch" "CVE-2017-15951" "CVE-2018-17972" "CVE-2019-2214" "CVE-2019-14070/ANY/0006.patch" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-42896/4.9";
|
||||
commentPatches android_kernel_nextbit_msm8992.sh "CVE-2018-3585/3.10/0001.patch" "CVE-2018-9514";
|
||||
commentPatches android_kernel_oneplus_msm8994.sh "CVE-2018-3585/3.10/0001.patch" "CVE-2018-9514";
|
||||
commentPatches android_kernel_oneplus_msm8994.sh "CVE-2018-3585/3.10/0001.patch" "CVE-2018-9514" "0002-Misc_Fixes-uid/3.10/0002-alt1.patch" "CVE-2017-17712/3.10/0010.patch";
|
||||
commentPatches android_kernel_oneplus_msm8996.sh "CVE-2017-13162/3.18/0001.patch" "CVE-2017-15951" "CVE-2017-16939" "CVE-2018-17972" "CVE-2019-2214" "CVE-2019-14070/ANY/0006.patch" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2022-42896/4.9";
|
||||
commentPatches android_kernel_oneplus_msm8998.sh "0008-Graphene-Kernel_Hardening-slab" "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-11599" "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166";
|
||||
commentPatches android_kernel_oneplus_sm7250.sh "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600" "CVE-2021-30324" "CVE-2021-45469" "CVE-2022-42703/4.19/0003.patch";
|
||||
|
@ -97,7 +97,7 @@ commentPatches android_kernel_sony_sdm845.sh "CVE-2019-19319" "CVE-2020-1749" "C
|
|||
commentPatches android_kernel_xiaomi_msm8937.sh "CVE-2017-13162" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-42896/4.9";
|
||||
commentPatches android_kernel_xiaomi_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch";
|
||||
commentPatches android_kernel_xiaomi_sm8150.sh "CVE-2020-24588/4.14/0018.patch";
|
||||
commentPatches android_kernel_xiaomi_sm8250.sh "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600";
|
||||
commentPatches android_kernel_xiaomi_sm8250.sh "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600" "CVE-2022-22075";
|
||||
commentPatches android_kernel_yandex_sdm660.sh "CVE-2019-11599" "CVE-2019-14070/ANY/0005.patch" "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166";
|
||||
commentPatches android_kernel_zte_msm8930.sh "CVE-2015-2922" "CVE-2017-11015/prima";
|
||||
commentPatches android_kernel_zte_msm8996.sh "0001-LinuxIncrementals/3.18/3.18.0098-0099.patch" "CVE-2017-13162" "CVE-2017-15951" "CVE-2017-16939" "CVE-2018-17972" "CVE-2019-2214" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-42896/4.9";
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
#!/bin/bash
|
||||
if cd "$DOS_BUILD_BASE""kernel/motorola/msm8992"; then
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-uid/3.10/0002-alt1.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-uid/3.10/0002-alt1.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch
|
||||
|
@ -76,7 +76,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17712/3.10/0010.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17712/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
#!/bin/bash
|
||||
if cd "$DOS_BUILD_BASE""kernel/oneplus/msm8994"; then
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-uid/3.10/0002-alt1.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-uid/3.10/0002-alt1.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch
|
||||
|
@ -79,7 +79,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17712/3.10/0010.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17712/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch
|
||||
|
|
|
@ -113,7 +113,7 @@ patchWorkspace() {
|
|||
verifyAllPlatformTags;
|
||||
gpgVerifyGitHead "$DOS_BUILD_BASE/external/chromium-webview";
|
||||
|
||||
#source build/envsetup.sh;
|
||||
source build/envsetup.sh;
|
||||
#repopick -it eleven-firewall;
|
||||
#repopick -i 314453; #TaskViewTouchController: Null check current animation on drag
|
||||
#repopick -i 325011; #lineage: Opt-in to shipping full recovery image by default
|
||||
|
|
|
@ -463,7 +463,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.19/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20566/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22075/ANY/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22075/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22095/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23041/4.19/0004.patch
|
||||
|
|
|
@ -78,7 +78,7 @@ patchWorkspace() {
|
|||
verifyAllPlatformTags;
|
||||
gpgVerifyGitHead "$DOS_BUILD_BASE/external/chromium-webview";
|
||||
|
||||
#source build/envsetup.sh;
|
||||
source build/envsetup.sh;
|
||||
#repopick -ift twelve-bt-sbc-hd-dualchannel;
|
||||
#repopick -it twelve-colors;
|
||||
repopick -if 330099; #Updater: Add prop for allowing major updates
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue