mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-12-25 07:29:24 -05:00
Fixup
Manually checked 3.4 and 4.4 Likely still more breakage Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
d2330cce15
commit
028541103d
@ -1 +1 @@
|
|||||||
Subproject commit f0dfdd5f6f46bb947481d1962e8d99a71acc2cc8
|
Subproject commit a4880eda7f83e2092422e2643bd96fb4f65ee2d5
|
@ -133,13 +133,13 @@ done
|
|||||||
declare -a threeDotEighteen=("${threeDotTen[@]}" "android_kernel_samsung_universal8890.sh" "android_kernel_google_dragon.sh" "android_kernel_zte_msm8996.sh" "android_kernel_asus_msm8953.sh" "android_kernel_google_marlin.sh" "android_kernel_motorola_msm8996.sh" "android_kernel_oneplus_msm8996.sh");
|
declare -a threeDotEighteen=("${threeDotTen[@]}" "android_kernel_samsung_universal8890.sh" "android_kernel_google_dragon.sh" "android_kernel_zte_msm8996.sh" "android_kernel_asus_msm8953.sh" "android_kernel_google_marlin.sh" "android_kernel_motorola_msm8996.sh" "android_kernel_oneplus_msm8996.sh");
|
||||||
for script in "${threeDotEighteen[@]}"
|
for script in "${threeDotEighteen[@]}"
|
||||||
do
|
do
|
||||||
commentPatches $script "0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch" "CVE-2018-16597/4.4" "CVE-2019-19319/4.4" "CVE-2020-0305/4.4" "CVE-2020-0429/4.4" "CVE-2020-8992/4.4" "CVE-2021-1048/4.4" "CVE-2021-3428/4.4" "CVE-2021-20265/4.4" "CVE-2022-1184/4.4/0014.patch" "CVE-2022-1184/4.9/0007.patch" "CVE-2022-40768/4.9/0007.patch" "CVE-2022-40768/4.4/0008.patch" "CVE-2022-47929/4.4" "CVE-2023-0458" "CVE-2024-26889";
|
commentPatches $script "0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch" "CVE-2018-16597/4.4" "CVE-2019-19319/4.4" "CVE-2020-0305/4.4" "CVE-2020-0429/4.4" "CVE-2020-8992/4.4" "CVE-2021-1048/4.4" "CVE-2021-3428/4.4" "CVE-2021-20265/4.4" "CVE-2021-47320" "CVE-2022-1184/4.4/0014.patch" "CVE-2022-1184/4.9/0007.patch" "CVE-2022-40768/4.9/0007.patch" "CVE-2022-40768/4.4/0008.patch" "CVE-2022-47929/4.4" "CVE-2023-0458" "CVE-2024-26889";
|
||||||
done
|
done
|
||||||
#4.4
|
#4.4
|
||||||
declare -a fourDotFour=("${threeDotEighteen[@]}" "android_kernel_essential_msm8998.sh" "android_kernel_fxtec_msm8998.sh" "android_kernel_lge_msm8996.sh" "android_kernel_zuk_msm8996.sh" "android_kernel_xiaomi_sdm660.sh" "android_kernel_sony_sdm660.sh" "android_kernel_razer_msm8998.sh" "android_kernel_oneplus_msm8998.sh" "android_kernel_google_wahoo.sh" "android_kernel_yandex_sdm660.sh" "android_kernel_zuk_msm8996.sh");
|
declare -a fourDotFour=("${threeDotEighteen[@]}" "android_kernel_essential_msm8998.sh" "android_kernel_fxtec_msm8998.sh" "android_kernel_lge_msm8996.sh" "android_kernel_zuk_msm8996.sh" "android_kernel_xiaomi_sdm660.sh" "android_kernel_sony_sdm660.sh" "android_kernel_razer_msm8998.sh" "android_kernel_oneplus_msm8998.sh" "android_kernel_google_wahoo.sh" "android_kernel_yandex_sdm660.sh" "android_kernel_zuk_msm8996.sh");
|
||||||
for script in "${fourDotFour[@]}"
|
for script in "${fourDotFour[@]}"
|
||||||
do
|
do
|
||||||
commentPatches $script "CVE-2021-47006" "CVE-2023-2513" "CVE-2023-4132";
|
commentPatches $script "CVE-2021-47006" "CVE-2021-47455" "CVE-2023-2513" "CVE-2023-4132";
|
||||||
done
|
done
|
||||||
#4.9
|
#4.9
|
||||||
declare -a fourDotNine=("${fourDotFour[@]}" "android_kernel_fairphone_sdm632.sh" "android_kernel_google_msm-4.9.sh" "android_kernel_oneplus_sdm845.sh" "android_kernel_razer_sdm845.sh" "android_kernel_samsung_exynos9810.sh" "android_kernel_samsung_universal9810.sh" "android_kernel_sony_sdm845.sh" "android_kernel_xiaomi_msm8937.sh" "android_kernel_xiaomi_sdm845.sh");
|
declare -a fourDotNine=("${fourDotFour[@]}" "android_kernel_fairphone_sdm632.sh" "android_kernel_google_msm-4.9.sh" "android_kernel_oneplus_sdm845.sh" "android_kernel_razer_sdm845.sh" "android_kernel_samsung_exynos9810.sh" "android_kernel_samsung_universal9810.sh" "android_kernel_sony_sdm845.sh" "android_kernel_xiaomi_msm8937.sh" "android_kernel_xiaomi_sdm845.sh");
|
||||||
|
@ -765,10 +765,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -892,7 +891,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
||||||
@ -906,7 +904,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p906"
|
editKernelLocalversion "-dos.p904"
|
||||||
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
|
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -433,10 +433,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -555,7 +554,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||||
@ -565,7 +563,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p565"
|
editKernelLocalversion "-dos.p563"
|
||||||
else echo "kernel_asus_grouper is unavailable, not patching.";
|
else echo "kernel_asus_grouper is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -447,10 +447,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -592,7 +591,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||||
@ -603,7 +601,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p603"
|
editKernelLocalversion "-dos.p601"
|
||||||
else echo "kernel_htc_msm8960 is unavailable, not patching.";
|
else echo "kernel_htc_msm8960 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -539,11 +539,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -703,7 +702,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -720,7 +718,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p720"
|
editKernelLocalversion "-dos.p718"
|
||||||
else echo "kernel_htc_msm8994 is unavailable, not patching.";
|
else echo "kernel_htc_msm8994 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -625,11 +625,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -789,7 +788,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -805,7 +803,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p805"
|
editKernelLocalversion "-dos.p803"
|
||||||
else echo "kernel_lge_msm8992 is unavailable, not patching.";
|
else echo "kernel_lge_msm8992 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -470,11 +470,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -654,7 +653,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -669,7 +667,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p669"
|
editKernelLocalversion "-dos.p667"
|
||||||
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
|
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -517,10 +517,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -667,7 +666,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||||
@ -678,7 +676,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p678"
|
editKernelLocalversion "-dos.p676"
|
||||||
else echo "kernel_samsung_d2 is unavailable, not patching.";
|
else echo "kernel_samsung_d2 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -226,10 +226,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -350,13 +349,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p356"
|
editKernelLocalversion "-dos.p354"
|
||||||
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
|
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -347,10 +347,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -470,7 +469,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||||
@ -479,7 +477,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p479"
|
editKernelLocalversion "-dos.p477"
|
||||||
else echo "kernel_samsung_manta is unavailable, not patching.";
|
else echo "kernel_samsung_manta is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -403,7 +403,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47334/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47334/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47340/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47340/4.4/0004.patch
|
||||||
@ -498,7 +498,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||||
@ -507,7 +506,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p507"
|
editKernelLocalversion "-dos.p506"
|
||||||
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
|
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -397,7 +397,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47334/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47334/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47340/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47340/4.4/0004.patch
|
||||||
@ -491,7 +491,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||||
@ -500,7 +499,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p500"
|
editKernelLocalversion "-dos.p499"
|
||||||
else echo "kernel_samsung_tuna is unavailable, not patching.";
|
else echo "kernel_samsung_tuna is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -734,7 +734,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
@ -742,7 +741,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -962,7 +961,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -982,7 +980,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p982"
|
editKernelLocalversion "-dos.p980"
|
||||||
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
|
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -633,11 +633,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -794,7 +793,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -817,7 +815,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p817"
|
editKernelLocalversion "-dos.p815"
|
||||||
else echo "kernel_asus_fugu is unavailable, not patching.";
|
else echo "kernel_asus_fugu is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -418,11 +418,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -602,7 +601,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -618,7 +616,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p618"
|
editKernelLocalversion "-dos.p616"
|
||||||
else echo "kernel_asus_msm8916 is unavailable, not patching.";
|
else echo "kernel_asus_msm8916 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -694,7 +694,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
@ -702,7 +701,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -924,7 +923,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -948,7 +946,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p948"
|
editKernelLocalversion "-dos.p946"
|
||||||
else echo "kernel_google_dragon is unavailable, not patching.";
|
else echo "kernel_google_dragon is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -429,11 +429,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -596,7 +595,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -613,7 +611,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p613"
|
editKernelLocalversion "-dos.p611"
|
||||||
else echo "kernel_htc_flounder is unavailable, not patching.";
|
else echo "kernel_htc_flounder is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -554,11 +554,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -723,7 +722,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -740,7 +738,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p740"
|
editKernelLocalversion "-dos.p738"
|
||||||
else echo "kernel_huawei_angler is unavailable, not patching.";
|
else echo "kernel_huawei_angler is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -562,11 +562,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -734,7 +733,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -751,7 +749,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p751"
|
editKernelLocalversion "-dos.p749"
|
||||||
else echo "kernel_lge_bullhead is unavailable, not patching.";
|
else echo "kernel_lge_bullhead is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -674,7 +674,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
@ -682,7 +681,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -919,7 +918,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -938,7 +936,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p938"
|
editKernelLocalversion "-dos.p936"
|
||||||
else echo "kernel_zte_msm8996 is unavailable, not patching.";
|
else echo "kernel_zte_msm8996 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -415,11 +415,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -600,7 +599,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -616,7 +614,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p616"
|
editKernelLocalversion "-dos.p614"
|
||||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -365,10 +365,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -522,7 +521,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||||
@ -531,7 +529,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p531"
|
editKernelLocalversion "-dos.p529"
|
||||||
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
|
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -478,11 +478,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -648,7 +647,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -663,7 +661,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p663"
|
editKernelLocalversion "-dos.p661"
|
||||||
else echo "kernel_google_yellowstone is unavailable, not patching.";
|
else echo "kernel_google_yellowstone is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -282,11 +282,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -451,7 +450,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -469,7 +467,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p469"
|
editKernelLocalversion "-dos.p467"
|
||||||
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
|
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -415,11 +415,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -600,7 +599,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -616,7 +614,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p616"
|
editKernelLocalversion "-dos.p614"
|
||||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -468,11 +468,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -648,7 +647,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -662,7 +660,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p662"
|
editKernelLocalversion "-dos.p660"
|
||||||
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
|
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -397,11 +397,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -568,7 +567,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -583,7 +581,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p583"
|
editKernelLocalversion "-dos.p581"
|
||||||
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
|
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -399,11 +399,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -570,7 +569,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -585,7 +583,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p585"
|
editKernelLocalversion "-dos.p583"
|
||||||
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
|
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -333,7 +333,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/4.14/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47280/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47280/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.14/0002.patch
|
||||||
@ -391,7 +390,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47440/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47442/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47442/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47443/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47443/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47445/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47445/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47456/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47456/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47458/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47458/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47460/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47460/4.14/0002.patch
|
||||||
@ -758,7 +757,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/^6.7/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -778,7 +776,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p778"
|
editKernelLocalversion "-dos.p776"
|
||||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -381,7 +381,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
@ -721,7 +720,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -743,7 +741,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p743"
|
editKernelLocalversion "-dos.p741"
|
||||||
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
|
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -221,10 +221,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -336,12 +335,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p341"
|
editKernelLocalversion "-dos.p339"
|
||||||
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
|
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -488,7 +488,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
@ -496,7 +495,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -736,7 +735,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -758,7 +756,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p758"
|
editKernelLocalversion "-dos.p756"
|
||||||
else echo "kernel_google_marlin is unavailable, not patching.";
|
else echo "kernel_google_marlin is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -387,10 +387,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -513,7 +512,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||||
@ -525,7 +523,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p525"
|
editKernelLocalversion "-dos.p523"
|
||||||
else echo "kernel_google_msm is unavailable, not patching.";
|
else echo "kernel_google_msm is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -468,10 +468,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -623,7 +622,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||||
@ -635,7 +633,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p635"
|
editKernelLocalversion "-dos.p633"
|
||||||
else echo "kernel_htc_msm8974 is unavailable, not patching.";
|
else echo "kernel_htc_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -397,10 +397,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -550,7 +549,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||||
@ -559,7 +557,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p559"
|
editKernelLocalversion "-dos.p557"
|
||||||
else echo "kernel_lge_g3 is unavailable, not patching.";
|
else echo "kernel_lge_g3 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -358,10 +358,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -487,7 +486,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||||
@ -497,7 +495,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p497"
|
editKernelLocalversion "-dos.p495"
|
||||||
else echo "kernel_lge_hammerhead is unavailable, not patching.";
|
else echo "kernel_lge_hammerhead is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -41,10 +41,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -130,12 +129,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p135"
|
editKernelLocalversion "-dos.p133"
|
||||||
else echo "kernel_lge_mako is unavailable, not patching.";
|
else echo "kernel_lge_mako is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -385,10 +385,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -535,7 +534,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||||
@ -543,7 +541,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p543"
|
editKernelLocalversion "-dos.p541"
|
||||||
else echo "kernel_lge_msm8974 is unavailable, not patching.";
|
else echo "kernel_lge_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -313,11 +313,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -486,7 +485,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -505,7 +503,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p505"
|
editKernelLocalversion "-dos.p503"
|
||||||
else echo "kernel_moto_shamu is unavailable, not patching.";
|
else echo "kernel_moto_shamu is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -451,10 +451,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -604,7 +603,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||||
@ -614,7 +612,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p614"
|
editKernelLocalversion "-dos.p612"
|
||||||
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
|
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -505,7 +505,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
@ -513,7 +512,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -753,7 +752,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -772,7 +770,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p772"
|
editKernelLocalversion "-dos.p770"
|
||||||
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
|
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -449,11 +449,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -620,7 +619,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
||||||
@ -635,7 +633,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p635"
|
editKernelLocalversion "-dos.p633"
|
||||||
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
|
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -490,7 +490,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.4/0004.patch
|
||||||
@ -498,7 +497,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47310/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47314/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47319/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -741,7 +740,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -760,7 +758,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p760"
|
editKernelLocalversion "-dos.p758"
|
||||||
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
|
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -328,10 +328,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -478,13 +477,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p484"
|
editKernelLocalversion "-dos.p482"
|
||||||
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
|
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -404,10 +404,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -551,7 +550,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||||
@ -563,7 +561,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p563"
|
editKernelLocalversion "-dos.p561"
|
||||||
else echo "kernel_samsung_jf is unavailable, not patching.";
|
else echo "kernel_samsung_jf is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -483,10 +483,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -633,7 +632,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||||
@ -647,7 +645,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p647"
|
editKernelLocalversion "-dos.p645"
|
||||||
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
|
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -233,10 +233,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47294/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47320/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47323/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47324/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47330/4.4/0004.patch
|
||||||
@ -364,12 +363,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p369"
|
editKernelLocalversion "-dos.p367"
|
||||||
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
|
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -66,9 +66,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
@ -379,7 +377,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -397,7 +394,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p397"
|
editKernelLocalversion "-dos.p394"
|
||||||
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -422,7 +422,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/4.14/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47280/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47280/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.14/0002.patch
|
||||||
@ -477,7 +476,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47440/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47442/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47442/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47443/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47443/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47445/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47445/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47456/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47456/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47458/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47458/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47460/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47460/4.14/0002.patch
|
||||||
@ -842,7 +841,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/^6.7/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -865,7 +863,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p865"
|
editKernelLocalversion "-dos.p863"
|
||||||
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -113,9 +113,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
@ -407,7 +405,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -428,7 +425,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p428"
|
editKernelLocalversion "-dos.p425"
|
||||||
else echo "kernel_essential_msm8998 is unavailable, not patching.";
|
else echo "kernel_essential_msm8998 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -66,9 +66,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
||||||
@ -253,7 +252,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -274,7 +272,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p274"
|
editKernelLocalversion "-dos.p272"
|
||||||
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
|
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -76,10 +76,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.19/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
||||||
@ -254,7 +253,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.19/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch
|
||||||
@ -285,7 +283,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||||
editKernelLocalversion "-dos.p285"
|
editKernelLocalversion "-dos.p283"
|
||||||
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
|
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -62,9 +62,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
@ -355,7 +353,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -373,7 +370,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p373"
|
editKernelLocalversion "-dos.p370"
|
||||||
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
|
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -76,10 +76,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.19/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
||||||
@ -254,7 +253,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.19/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch
|
||||||
@ -285,7 +283,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||||
editKernelLocalversion "-dos.p285"
|
editKernelLocalversion "-dos.p283"
|
||||||
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
|
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -46,7 +46,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/5.10/0007.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47381/^5.14/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47381/^5.14/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47391/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47391/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0480/4.9-^5.14/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0480/4.9-^5.14/0001.patch
|
||||||
@ -605,7 +605,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/5.10/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35884/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35884/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35888/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35888/5.10/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/5.10/0003.patch
|
||||||
@ -653,7 +652,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||||
editKernelLocalversion "-dos.p653"
|
editKernelLocalversion "-dos.p652"
|
||||||
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
|
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -46,7 +46,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/5.10/0007.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47381/^5.14/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47381/^5.14/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47391/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47391/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0480/4.9-^5.14/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0480/4.9-^5.14/0001.patch
|
||||||
@ -603,7 +603,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/5.10/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35884/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35884/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35888/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35888/5.10/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/5.10/0003.patch
|
||||||
@ -651,7 +650,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||||
editKernelLocalversion "-dos.p651"
|
editKernelLocalversion "-dos.p650"
|
||||||
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
|
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -74,10 +74,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47268/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47268/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47346/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47346/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
||||||
@ -205,7 +204,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/^6.7/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -224,7 +222,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p224"
|
editKernelLocalversion "-dos.p222"
|
||||||
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
|
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -72,9 +72,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
|
||||||
@ -258,7 +257,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -278,7 +276,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p278"
|
editKernelLocalversion "-dos.p276"
|
||||||
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
|
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -75,10 +75,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47268/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47268/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
||||||
@ -458,7 +457,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.19/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch
|
||||||
@ -489,7 +487,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||||
editKernelLocalversion "-dos.p489"
|
editKernelLocalversion "-dos.p487"
|
||||||
else echo "kernel_google_redbull is unavailable, not patching.";
|
else echo "kernel_google_redbull is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -84,9 +84,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
@ -372,7 +370,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -393,7 +390,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p393"
|
editKernelLocalversion "-dos.p390"
|
||||||
else echo "kernel_google_wahoo is unavailable, not patching.";
|
else echo "kernel_google_wahoo is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -62,9 +62,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
@ -355,7 +353,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -373,7 +370,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p373"
|
editKernelLocalversion "-dos.p370"
|
||||||
else echo "kernel_lge_msm8996 is unavailable, not patching.";
|
else echo "kernel_lge_msm8996 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -62,9 +62,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
@ -359,7 +357,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -377,7 +374,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p377"
|
editKernelLocalversion "-dos.p374"
|
||||||
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
|
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -66,9 +66,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
|
||||||
@ -257,7 +256,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -278,7 +276,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p278"
|
editKernelLocalversion "-dos.p276"
|
||||||
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
|
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -73,10 +73,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.19/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
||||||
@ -304,7 +303,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.19/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch
|
||||||
@ -335,7 +333,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||||
editKernelLocalversion "-dos.p335"
|
editKernelLocalversion "-dos.p333"
|
||||||
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
|
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -397,7 +397,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/4.14/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47280/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47280/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.14/0002.patch
|
||||||
@ -452,7 +451,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47440/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47442/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47442/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47443/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47443/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47445/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47445/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47456/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47456/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47458/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47458/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47460/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47460/4.14/0002.patch
|
||||||
@ -809,7 +808,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/^6.7/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -831,7 +829,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p831"
|
editKernelLocalversion "-dos.p829"
|
||||||
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
|
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -74,10 +74,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.19/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
||||||
@ -252,7 +251,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.19/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch
|
||||||
@ -283,7 +281,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||||
editKernelLocalversion "-dos.p283"
|
editKernelLocalversion "-dos.p281"
|
||||||
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
|
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -31,11 +31,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47228/^5.13/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/5.4/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/5.4/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47268/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47268/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47381/^5.14/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47381/^5.14/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47413/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47413/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
||||||
@ -285,7 +284,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35876/5.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/5.4/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/5.4/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/5.4/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/5.4/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/5.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/5.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35897/5.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35897/5.4/0004.patch
|
||||||
@ -325,7 +323,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
|
||||||
editKernelLocalversion "-dos.p325"
|
editKernelLocalversion "-dos.p323"
|
||||||
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
|
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -62,9 +62,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
@ -355,7 +353,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -373,7 +370,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p373"
|
editKernelLocalversion "-dos.p370"
|
||||||
else echo "kernel_razer_msm8998 is unavailable, not patching.";
|
else echo "kernel_razer_msm8998 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -66,9 +66,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
|
||||||
@ -256,7 +255,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -277,7 +275,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p277"
|
editKernelLocalversion "-dos.p275"
|
||||||
else echo "kernel_razer_sdm845 is unavailable, not patching.";
|
else echo "kernel_razer_sdm845 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -522,7 +522,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47270/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47270/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.9/0005.patch
|
||||||
@ -845,7 +844,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -864,7 +862,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p864"
|
editKernelLocalversion "-dos.p862"
|
||||||
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
|
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -69,9 +69,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
@ -372,7 +370,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -390,7 +387,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p390"
|
editKernelLocalversion "-dos.p387"
|
||||||
else echo "kernel_sony_sdm660 is unavailable, not patching.";
|
else echo "kernel_sony_sdm660 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -352,7 +352,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47285/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47288/4.9/0005.patch
|
||||||
@ -396,7 +395,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47440/4.9/0005.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47442/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47442/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47443/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47443/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47445/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47445/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47456/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47456/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47458/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47458/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47460/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47460/4.9/0004.patch
|
||||||
@ -697,7 +696,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -720,7 +718,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p720"
|
editKernelLocalversion "-dos.p718"
|
||||||
else echo "kernel_sony_sdm845 is unavailable, not patching.";
|
else echo "kernel_sony_sdm845 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -62,9 +62,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
||||||
@ -254,7 +253,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -275,7 +273,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p275"
|
editKernelLocalversion "-dos.p273"
|
||||||
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
|
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -68,9 +68,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch
|
||||||
@ -260,7 +259,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35822/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -281,7 +279,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p281"
|
editKernelLocalversion "-dos.p279"
|
||||||
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -78,10 +78,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.14/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47346/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47346/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||||
@ -238,7 +237,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/^6.7/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -257,7 +255,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p257"
|
editKernelLocalversion "-dos.p255"
|
||||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -75,10 +75,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.19/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch
|
||||||
@ -149,7 +148,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35824/^6.8/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35847/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35847/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.19/0002.patch
|
||||||
@ -166,7 +164,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||||
editKernelLocalversion "-dos.p166"
|
editKernelLocalversion "-dos.p164"
|
||||||
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -76,10 +76,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.14/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47209/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47234/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47346/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47346/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/4.9-^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47498/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||||
@ -240,7 +239,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/^6.7/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/^6.9/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/^6.8/0002.patch
|
||||||
@ -259,7 +257,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
|
||||||
editKernelLocalversion "-dos.p259"
|
editKernelLocalversion "-dos.p257"
|
||||||
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
|
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -67,9 +67,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47283/^5.12/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47455/^5.15/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch
|
||||||
@ -370,7 +368,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35830/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35887/^6.9/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||||
@ -389,7 +386,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directo
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p389"
|
editKernelLocalversion "-dos.p386"
|
||||||
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
|
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
Loading…
Reference in New Issue
Block a user