mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
ac1e89f0c8
This removes many duplicately or wrongly applied patches. Correctly removed: - CVE-2011-4132 can apply infinitely - CVE-2013-2891 can apply infinitely - CVE-2014-9781 can apply once to fb_cmap_to_user correctly and incorrectly to fb_copy_cmap - CVE-2015-0571 can apply incorrectly and was disabled in patch repo as a result - CVE-2016-2475 can apply infinitely - CVE-2017-0627 can apply infinitely - CVE-2017-0750 can apply infinitely - CVE-2017-14875 can apply infinitely - CVE-2017-14883 can apply infinitely - CVE-2020-11146 can apply infinitely - CVE-2020-11608 can apply infinitely - CVE-2021-42008 can apply infinitely Questionable (might actually be beneficial to "incorrectly" apply again): - CVE-2012-6544 can apply once to hci_sock_getsockopt correctly and incorrectly to hci_sock_setsockopt - CVE-2013-2898 can apply once to sensor_hub_get_feature correctly and incorrectly to sensor_hub_set_feature - CVE-2015-8575 can apply once to sco_sock_bind correctly and incorrectly to sco_sock_connect - CVE-2017-8281 can apply once to diagchar_ioctl correctly and incorrectly to diagchar_compat_ioctl - CVE-2019-10622 can apply once to qdsp_cvp_callback correctly and incorrectly to qdsp_cvs_callback - CVE-2019-14104 can apply once to cam_context_handle_start/stop_dev and incorrectly to cam_context_handle_crm_process_evt and cam_context_handle_flush_dev Other notes: - CVE-2016-6693 can be applied again if it was already applied in combination with CVE-2016-6696 then the dupe check will fail and mark CVE-2016-6696 as already applied, effectively reverting it. This was seemingly fixed with a hand merged patch in patch repo. Wrongly removed: - CVE-2013-2147 is meant for cciss_ioctl32_passthru but is detected in cciss_ioctl32_big_passthru - CVE-2015-8746 is meant for nfs_v4_2_minor_ops but is detected in nfs_v4_1_minor_ops - CVE-2021-Misc2/ANY/0043.patch is meant for WLANTL_RxCachedFrames but is detected in WLANTL_RxFrames Signed-off-by: Tad <tad@spotco.us>
204 lines
13 KiB
Bash
204 lines
13 KiB
Bash
#!/bin/bash
|
|
cd "$DOS_BUILD_BASE""kernel/samsung/exynos5420"
|
|
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0007.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.4/3.4-Backport.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch
|
|
#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch
|
|
#git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch
|
|
#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3229/3.4/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6410/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9870/ANY/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9895/ANY/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0006.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.4/0004.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.4/0018.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.4/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.4/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.4/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.4/0018.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.4/0019.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3135/3.4/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.4/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.4/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.4/0010.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3672/3.4/0007.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4578/3.10/0004.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/^4.5.5/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7916/3.4/0010.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8406/ANY/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/^4.7.4/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.4/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/3.4/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0710/3.4/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2636/3.4/0010.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.4/0010.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/3.4/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.4/0014.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0007.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0007.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/^4.12.4/0001.patch
|
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18193/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18241/4.4/0004.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/4.4/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/^4.13/0004.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch
|
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.4/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0011.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3.7/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.4/0015.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch
|
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.0-^3.10/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch
|
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.4/0004.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch
|
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0061.patch
|
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0062.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0071.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0072.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
|
editKernelLocalversion "-dos.p199"
|
|
cd "$DOS_BUILD_BASE"
|