mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
Various changes
- 15.1: asb picks - 17.1: drop marlin, sailfish, z2_plus, m8 - 4.9 loose versioning fixes
This commit is contained in:
parent
a8cfa8157c
commit
f4fbe65756
@ -87,22 +87,11 @@
|
||||
<project path="kernel/google/yellowstone" name="LineageOS/android_kernel_google_yellowstone" remote="github" />
|
||||
<project path="hardware/nvidia/libstagefrighthw" name="LineageOS/android_hardware_nvidia_libstagefrighthw" remote="github" revision="lineage-16.0" />
|
||||
|
||||
<!-- Google Pixel (marlin/sailfish) -->
|
||||
<project path="device/google/marlin" name="LineageOS/android_device_google_marlin" remote="github" />
|
||||
<project path="device/google/sailfish" name="LineageOS/android_device_google_sailfish" remote="github" />
|
||||
<project path="kernel/google/marlin" name="LineageOS/android_kernel_google_marlin" remote="github" />
|
||||
|
||||
<!-- Google Pixel 3a (bonito/sargo) -->
|
||||
<project path="device/google/bonito" name="LineageOS/android_device_google_bonito" remote="github" />
|
||||
<project path="device/google/sargo" name="LineageOS/android_device_google_sargo" remote="github" />
|
||||
<project path="kernel/google/msm-4.9" name="LineageOS/android_kernel_google_msm-4.9" remote="github" />
|
||||
|
||||
<!-- HTC One (m8) -->
|
||||
<project path="device/htc/m8" name="LineageOS/android_device_htc_m8" remote="github" />
|
||||
<project path="device/htc/m8-common" name="LineageOS/android_device_htc_m8-common" remote="github" />
|
||||
<project path="device/htc/msm8974-common" name="LineageOS/android_device_htc_msm8974-common" remote="github" />
|
||||
<project path="kernel/htc/msm8974" name="LineageOS/android_kernel_htc_msm8974" remote="github" />
|
||||
|
||||
<!-- Motorola msm8916 commons -->
|
||||
<project path="device/motorola/msm8916-common" name="LineageOS/android_device_motorola_msm8916-common" remote="github" />
|
||||
<project path="kernel/motorola/msm8916" name="LineageOS/android_kernel_motorola_msm8916" remote="github" />
|
||||
@ -156,10 +145,4 @@
|
||||
<!-- Yandex Phone (Amber) -->
|
||||
<project path="device/yandex/Amber" name="LineageOS/android_device_yandex_Amber" remote="github" />
|
||||
<project path="kernel/yandex/sdm660" name="LineageOS/android_kernel_yandex_sdm660" remote="github" />
|
||||
|
||||
<!-- Zuk Z2 Plus (z2_plus) -->
|
||||
<project path="device/zuk/z2_plus" name="LineageOS/android_device_zuk_z2_plus" remote="github" />
|
||||
<project path="device/zuk/msm8996-common" name="LineageOS/android_device_zuk_msm8996-common" remote="github" />
|
||||
<project path="kernel/zuk/msm8996" name="LineageOS/android_kernel_zuk_msm8996" remote="github" />
|
||||
|
||||
</manifest>
|
||||
|
@ -48,7 +48,7 @@ commentPatches android_kernel_fairphone_sdm632.sh "CVE-2019-19319" "CVE-2020-174
|
||||
commentPatches android_kernel_fxtec_msm8998.sh "0008-Graphene-Kernel_Hardening/4.4/0011.patch" "0008-Graphene-Kernel_Hardening/4.4/0012.patch" "0008-Graphene-Kernel_Hardening/4.4/0014.patch" "0008-Graphene-Kernel_Hardening/4.4/0019.patch" "CVE-2019-11599" "CVE-2019-16746" "CVE-2019-18282" "CVE-2019-19319" "CVE-2019-ctnl-addr-leak" "CVE-2020-0429" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166";
|
||||
commentPatches android_kernel_google_bonito.sh "CVE-2020-0067";
|
||||
commentPatches android_kernel_google_coral.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2021-30324";
|
||||
commentPatches android_kernel_google_dragon.sh "0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch" "CVE-2015-4167" "CVE-2017-15951" "CVE-2016-1237" "CVE-2016-6198" "CVE-2017-7374" "CVE-2018-17972" "CVE-2019-2214";
|
||||
commentPatches android_kernel_google_dragon.sh "0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch" "0008-Graphene-Kernel_Hardening/4.9/0053.patch" "0008-Graphene-Kernel_Hardening/4.9/0055.patch" "CVE-2015-4167" "CVE-2017-15951" "CVE-2016-1237" "CVE-2016-6198" "CVE-2017-7374" "CVE-2018-17972" "CVE-2019-2214";
|
||||
commentPatches android_kernel_google_crosshatch.sh "CVE-2020-0067";
|
||||
commentPatches android_kernel_google_marlin.sh "0001-LinuxIncrementals/3.18/3.18.0098-0099.patch" "0006-AndroidHardening-Kernel_Hardening/3.18/0048.patch" "0006-AndroidHardening-Kernel_Hardening/3.18/0049.patch" "CVE-2017-13162/3.18/0001.patch" "CVE-2017-14883" "CVE-2017-15951" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166";
|
||||
commentPatches android_kernel_google_msm.sh "CVE-2017-11015/prima" "CVE-2021-Misc2/ANY/0031.patch";
|
||||
@ -84,7 +84,7 @@ commentPatches android_kernel_samsung_manta.sh "CVE-2021-Misc2/3.4/0055.patch" "
|
||||
commentPatches android_kernel_samsung_msm8930-common.sh "CVE-2017-11015/prima" "CVE-2019-11599" "CVE-2021-Misc2/ANY/0031.patch";
|
||||
commentPatches android_kernel_samsung_smdk4412.sh "CVE-2012-2127" "CVE-2016-8463/ANY/0001.patch";
|
||||
commentPatches android_kernel_samsung_tuna.sh "CVE-2012-2127";
|
||||
commentPatches android_kernel_samsung_universal8890.sh "CVE-2016-7917" "CVE-2018-1092" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166";
|
||||
commentPatches android_kernel_samsung_universal8890.sh "0008-Graphene-Kernel_Hardening/4.9/0053.patch" "0008-Graphene-Kernel_Hardening/4.9/0055.patch" "CVE-2016-7917" "CVE-2018-1092" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166";
|
||||
commentPatches android_kernel_samsung_universal9810.sh "CVE-2020-1749";
|
||||
commentPatches android_kernel_sony_sdm660.sh "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166";
|
||||
commentPatches android_kernel_sony_sdm845.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992";
|
||||
|
@ -31,8 +31,8 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/00
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0053.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0053.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7446/^4.3.3/0003.patch
|
||||
|
@ -26,8 +26,8 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/00
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0053.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0053.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.18/0007.patch
|
||||
|
@ -88,7 +88,8 @@ patchWorkspace() {
|
||||
touch DOS_PATCHED_FLAG;
|
||||
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi;
|
||||
|
||||
#source build/envsetup.sh;
|
||||
source build/envsetup.sh;
|
||||
repopick -it O_asb_2022-02;
|
||||
|
||||
sh "$DOS_SCRIPTS/Patch.sh";
|
||||
sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";
|
||||
|
@ -73,7 +73,7 @@ applyPatch "$DOS_PATCHES/android_build/0002-Enable_fwrapv.patch"; #Use -fwrapv a
|
||||
sed -i '57i$(my_res_package): PRIVATE_AAPT_FLAGS += --auto-add-overlay' core/aapt2.mk; #Enable auto-add-overlay for packages, this allows the vendor overlay to easily work across all branches.
|
||||
if [ "$DOS_SILENCE_INCLUDED" = true ]; then sed -i 's/messaging/Silence/' target/product/aosp_base_telephony.mk target/product/treble_common.mk; fi; #Replace the Messaging app with Silence
|
||||
awk -i inplace '!/Email/' target/product/core.mk; #Remove Email
|
||||
sed -i 's/2021-10-05/2022-01-05/' core/version_defaults.mk; #Bump Security String #O_asb_2022-01 #XXX
|
||||
sed -i 's/2021-10-05/2022-02-05/' core/version_defaults.mk; #Bump Security String #O_asb_2022-02 #XXX
|
||||
fi;
|
||||
|
||||
if enterAndClear "build/soong"; then
|
||||
|
@ -83,9 +83,8 @@ patchWorkspace() {
|
||||
touch DOS_PATCHED_FLAG;
|
||||
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi;
|
||||
|
||||
source build/envsetup.sh;
|
||||
#source build/envsetup.sh;
|
||||
#repopick -it pie-firewall;
|
||||
repopick -it P_asb_2022-02;
|
||||
|
||||
sh "$DOS_SCRIPTS/Patch.sh";
|
||||
sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";
|
||||
|
@ -1,465 +0,0 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/google/marlin"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0021.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0044.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0045.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0048.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0049.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0053.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0571/qcacld-2.0/0004.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0571/qcacld-2.0/0006.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0571/qcacld-2.0/0007.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0571/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.2.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.3.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/^4.5.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3906/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5345/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5854/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5856/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5857/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5858/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5870/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8483/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3.6/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9191/3.11-^4.8.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10235/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0464/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0622/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0866/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5967/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7372/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9150/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9707/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9713/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11034/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11036/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13162/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15827/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15856/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18150/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18161/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5863/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11980/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/3.18/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2290/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10536/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10614/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^4.1/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14049/ANY/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/3.18/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25045/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/3.18/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3665/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0008.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11116/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11131/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24587/qcacld-2.0/0013.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27675/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20265/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
editKernelLocalversion "-dos.p461"
|
||||
cd "$DOS_BUILD_BASE"
|
@ -1,464 +0,0 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/htc/msm8974"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6544/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6410/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9781/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8575/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2443/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3907/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5859/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5867/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^4.5.2/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8450/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9806/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10232/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10234/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10284/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0452/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0453/prima/0003.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0463/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0613/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0630/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0786/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6426/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7368/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7374/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7889/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8236/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8266/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9684/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9714/prima/0003.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9719/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11002/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11013/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11014/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11024/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11039/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11085/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11092/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13078/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.4/0076.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14879/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15817/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15817/prima/0002.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15819/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15819/prima/0002.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15850/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17807/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18193/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18241/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18249/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1092/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3564/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3586/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5835/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5896/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6927/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9439/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9517/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11894/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-5489/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9456/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10497/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.4/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.4/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3651/prima/0001.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.4/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11115/prima/0003.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11116/prima/0003.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11118/prima/0003.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/3.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11272/prima/0002.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/prima/0015.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/prima/0009.patch --directory=drivers/staging/prima
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.0-^3.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30262/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0057.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0061.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0062.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0064.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0065.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0066.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0067.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0068.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0071.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0072.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0021.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0032.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch
|
||||
editKernelLocalversion "-dos.p460"
|
||||
cd "$DOS_BUILD_BASE"
|
@ -1,334 +0,0 @@
|
||||
#!/bin/bash
|
||||
cd "$DOS_BUILD_BASE""kernel/zuk/msm8996"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0209-0210.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0233-0234.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0242-0243.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0251-0252.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0288-0289.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0298-0299.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.4/4.4.0300-0301.patch --exclude=Makefile
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0571/qcacld-2.0/0004.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0571/qcacld-2.0/0006.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0571/qcacld-2.0/0007.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0571/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6.3/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6696/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14875/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14883/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13.3/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^4.20.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^4.16.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15221/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17351/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3.11/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19338/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/^4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0021.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0022.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0023.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0024.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.4/0025.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3699/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0026.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0027.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0028.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.4/0030.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8428/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/4.4/0021.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11116/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11131/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11262/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/^5.6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26146/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26558/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.4/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.1-^5.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0046.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0047.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0048.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0049.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0050.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0051.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0052.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0053.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0054.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.4/0055.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0013.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0018.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0019.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.4/0020.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43976/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
|
||||
editKernelLocalversion "-dos.p330"
|
||||
cd "$DOS_BUILD_BASE"
|
@ -19,7 +19,7 @@ umask 0022;
|
||||
#Last verified: 2021-10-16
|
||||
|
||||
patchAllKernels() {
|
||||
startPatcher "kernel_asus_fugu kernel_cyanogen_msm8916 kernel_google_marlin kernel_google_msm-4.9 kernel_google_yellowstone kernel_htc_msm8974 kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_motorola_msm8996 kernel_oneplus_msm8994 kernel_oneplus_sm7250 kernel_oneplus_sm8150 kernel_xiaomi_sm6150 kernel_yandex_sdm660 kernel_zuk_msm8996";
|
||||
startPatcher "kernel_asus_fugu kernel_cyanogen_msm8916 kernel_google_msm-4.9 kernel_google_yellowstone kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_motorola_msm8996 kernel_oneplus_msm8994 kernel_oneplus_sm7250 kernel_oneplus_sm8150 kernel_xiaomi_sm6150 kernel_yandex_sdm660";
|
||||
}
|
||||
export -f patchAllKernels;
|
||||
|
||||
@ -61,18 +61,12 @@ buildAll() {
|
||||
buildDevice merlin;
|
||||
buildDevice osprey;
|
||||
buildDevice surnia;
|
||||
#SD801
|
||||
buildDevice m8; #18.1 has issues?
|
||||
#SD808
|
||||
buildDevice clark;
|
||||
#SD810
|
||||
buildDevice oneplus2;
|
||||
#SD820
|
||||
buildDevice griffin;
|
||||
buildDevice z2_plus verity;
|
||||
#SD821
|
||||
buildDevice marlin verity;
|
||||
buildDevice sailfish verity;
|
||||
#SD730
|
||||
buildDevice davinci avb;
|
||||
#SD855
|
||||
@ -111,11 +105,6 @@ patchWorkspace() {
|
||||
sh "$DOS_SCRIPTS_COMMON/Patch_CVE.sh";
|
||||
sh "$DOS_SCRIPTS_COMMON/Post.sh";
|
||||
source build/envsetup.sh;
|
||||
|
||||
#Deblobbing fixes
|
||||
##setup-makefiles doesn't execute properly for some devices, running it twice seems to fix whatever is wrong
|
||||
cd device/google/marlin/marlin && ./setup-makefiles.sh && cd "$DOS_BUILD_BASE";
|
||||
cd device/google/marlin/sailfish && ./setup-makefiles.sh && cd "$DOS_BUILD_BASE";
|
||||
}
|
||||
export -f patchWorkspace;
|
||||
|
||||
|
@ -307,14 +307,6 @@ if enterAndClear "device/google/bonito"; then
|
||||
awk -i inplace '!/INODE_COUNT/' BoardConfig-lineage.mk; #mke2fs -1 incompatibility (?)
|
||||
fi;
|
||||
|
||||
if enterAndClear "device/google/marlin"; then
|
||||
sed -i 's/BTLogSave \\/BTLogSave/' common/base.mk; #deblobber fixup
|
||||
fi;
|
||||
|
||||
if enterAndClear "device/htc/m8-common"; then
|
||||
awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #broken releasetools
|
||||
fi;
|
||||
|
||||
if enterAndClear "device/motorola/clark"; then
|
||||
echo "allow mm-qcamerad camera_prop:property_service set;" >> sepolicy/mm-qcamerad.te;
|
||||
echo "allow mm-qcamerad property_socket:sock_file write;" >> sepolicy/mm-qcamerad.te;
|
||||
@ -351,14 +343,6 @@ if enterAndClear "device/oppo/common"; then
|
||||
awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #disable releasetools to fix delta ota generation
|
||||
fi;
|
||||
|
||||
if enterAndClear "device/zuk/msm8996-common"; then
|
||||
awk -i inplace '!/WfdCommon/' msm8996.mk; #fix breakage
|
||||
fi;
|
||||
|
||||
if enterAndClear "kernel/google/marlin"; then
|
||||
git revert --no-edit dd4a454f080f60cc7c4f5cc281a48cba80947baf; #enable verity on /vendor
|
||||
fi;
|
||||
|
||||
#Make changes to all devices
|
||||
cd "$DOS_BUILD_BASE";
|
||||
if [ "$DOS_LOWRAM_ENABLED" = true ]; then find "device" -maxdepth 2 -mindepth 2 -type d -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'enableLowRam "{}"'; fi;
|
||||
|
Loading…
Reference in New Issue
Block a user