mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-12-23 14:39:24 -05:00
Update CVE patchers
Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
4dae73c77d
commit
1751f66c06
@ -798,7 +798,7 @@ kernel/xiaomi/sm8150 950783ac4623027778367cb8f8c6c24f17e88dd9
|
||||
libcore 3d79b82fa5058fadc5c9696811b38a48cb5eddbb
|
||||
libnativehelper 4127df85264539c1fcc6dcbf59410e9edaa2e0c6
|
||||
lineage-sdk d4565e22e04e8030ac8d8551dfe11a868b8366a9
|
||||
lineage/scripts e988793c8b7ef6922858e9f1fc7d3a0da90ab2f5
|
||||
lineage/scripts f6e4c963bcc31fb434a18ff28318c23aa64c6a0d
|
||||
packages/apps/AudioFX 2c1be3c3b062e397bfd1e780ddb0bae1f99c1b84
|
||||
packages/apps/Backgrounds f778988c6b8d36e87399b5678239d4f696e4cab2
|
||||
packages/apps/BasicSmsReceiver 7c6a070c68413bab5343043af3df220226759568
|
||||
|
@ -1030,7 +1030,7 @@ kernel/zuk/msm8996 cc57cb4ee3b7918b74d30604735d353b9a5fa23b
|
||||
libcore 2a7d66adbcde1862f9295ae0a13f1751b193e4d7
|
||||
libnativehelper 49ecc5f1e97e810d27e2c6558abdde49e875349b
|
||||
lineage-sdk 6e45a0210999b9e87ce18450240a77be5130564a
|
||||
lineage/scripts e988793c8b7ef6922858e9f1fc7d3a0da90ab2f5
|
||||
lineage/scripts f6e4c963bcc31fb434a18ff28318c23aa64c6a0d
|
||||
packages/apps/Aperture 1afb9eea0a41e1b9cba5d91efee6a035c5e9318b
|
||||
packages/apps/AudioFX 15e2a666d21551698ea0744996abcdc35e6c0cc1
|
||||
packages/apps/Backgrounds 3b5c676d5a2747e92b14a79707c0aa3a6339bd4f
|
||||
|
@ -1 +1 @@
|
||||
Subproject commit a520d9bdc00587eb8042b86eb5657b7e72e9cf70
|
||||
Subproject commit fa1efccf74d9ebbf6eeb0b8664b57ddb172db275
|
@ -949,6 +949,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
|
||||
@ -961,7 +962,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p961"
|
||||
editKernelLocalversion "-dos.p962"
|
||||
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -613,6 +613,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -621,7 +622,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p621"
|
||||
editKernelLocalversion "-dos.p622"
|
||||
else echo "kernel_asus_grouper is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -650,6 +650,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
@ -659,7 +660,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p659"
|
||||
editKernelLocalversion "-dos.p660"
|
||||
else echo "kernel_htc_msm8960 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -783,6 +783,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
@ -795,7 +796,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p795"
|
||||
editKernelLocalversion "-dos.p796"
|
||||
else echo "kernel_htc_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -868,6 +868,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
@ -879,7 +880,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p879"
|
||||
editKernelLocalversion "-dos.p880"
|
||||
else echo "kernel_lge_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -735,6 +735,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -744,7 +745,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p744"
|
||||
editKernelLocalversion "-dos.p745"
|
||||
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -725,6 +725,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
@ -734,7 +735,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p734"
|
||||
editKernelLocalversion "-dos.p735"
|
||||
else echo "kernel_samsung_d2 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -410,11 +410,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p414"
|
||||
editKernelLocalversion "-dos.p415"
|
||||
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -528,6 +528,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -535,7 +536,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p535"
|
||||
editKernelLocalversion "-dos.p536"
|
||||
else echo "kernel_samsung_manta is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -542,6 +542,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -550,7 +551,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p550"
|
||||
editKernelLocalversion "-dos.p551"
|
||||
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -532,6 +532,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -540,7 +541,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p540"
|
||||
editKernelLocalversion "-dos.p541"
|
||||
else echo "kernel_samsung_tuna is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1076,6 +1076,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
@ -1087,7 +1088,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p1087"
|
||||
editKernelLocalversion "-dos.p1088"
|
||||
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -872,6 +872,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
|
||||
@ -890,7 +891,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p890"
|
||||
editKernelLocalversion "-dos.p891"
|
||||
else echo "kernel_asus_fugu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -684,6 +684,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -694,7 +695,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p694"
|
||||
editKernelLocalversion "-dos.p695"
|
||||
else echo "kernel_asus_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1044,6 +1044,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
@ -1057,7 +1059,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p1057"
|
||||
editKernelLocalversion "-dos.p1059"
|
||||
else echo "kernel_google_dragon is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -677,6 +677,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
@ -688,7 +689,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p688"
|
||||
editKernelLocalversion "-dos.p689"
|
||||
else echo "kernel_htc_flounder is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -803,6 +803,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
@ -815,7 +816,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p815"
|
||||
editKernelLocalversion "-dos.p816"
|
||||
else echo "kernel_huawei_angler is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -814,6 +814,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
@ -826,7 +827,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p826"
|
||||
editKernelLocalversion "-dos.p827"
|
||||
else echo "kernel_lge_bullhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1037,6 +1037,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
@ -1047,7 +1048,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p1047"
|
||||
editKernelLocalversion "-dos.p1048"
|
||||
else echo "kernel_zte_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -682,6 +682,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -692,7 +693,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p692"
|
||||
editKernelLocalversion "-dos.p693"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -579,6 +579,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -586,7 +587,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p586"
|
||||
editKernelLocalversion "-dos.p587"
|
||||
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -727,6 +727,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -737,7 +738,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p737"
|
||||
editKernelLocalversion "-dos.p738"
|
||||
else echo "kernel_google_yellowstone is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -533,6 +533,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
@ -545,7 +546,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p545"
|
||||
editKernelLocalversion "-dos.p546"
|
||||
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -682,6 +682,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -692,7 +693,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p692"
|
||||
editKernelLocalversion "-dos.p693"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -726,6 +726,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
@ -735,7 +736,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p735"
|
||||
editKernelLocalversion "-dos.p736"
|
||||
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -650,6 +650,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -659,7 +660,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p659"
|
||||
editKernelLocalversion "-dos.p660"
|
||||
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -652,6 +652,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -661,7 +662,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p661"
|
||||
editKernelLocalversion "-dos.p662"
|
||||
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -938,7 +938,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36015/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
@ -1010,19 +1010,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
|
||||
@ -1064,6 +1064,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
||||
@ -1071,7 +1076,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1071"
|
||||
editKernelLocalversion "-dos.p1076"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -885,6 +885,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
@ -893,7 +896,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p893"
|
||||
editKernelLocalversion "-dos.p896"
|
||||
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -393,10 +393,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p396"
|
||||
editKernelLocalversion "-dos.p397"
|
||||
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -851,6 +851,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
@ -863,7 +864,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p863"
|
||||
editKernelLocalversion "-dos.p864"
|
||||
else echo "kernel_google_marlin is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -570,6 +570,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
|
||||
@ -580,7 +581,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p580"
|
||||
editKernelLocalversion "-dos.p581"
|
||||
else echo "kernel_google_msm is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -680,6 +680,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
||||
@ -690,7 +691,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p690"
|
||||
editKernelLocalversion "-dos.p691"
|
||||
else echo "kernel_htc_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -607,6 +607,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -614,7 +615,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p614"
|
||||
editKernelLocalversion "-dos.p615"
|
||||
else echo "kernel_lge_g3 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -544,6 +544,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -552,7 +553,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p552"
|
||||
editKernelLocalversion "-dos.p553"
|
||||
else echo "kernel_lge_hammerhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -187,10 +187,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p190"
|
||||
editKernelLocalversion "-dos.p191"
|
||||
else echo "kernel_lge_mako is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -592,13 +592,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p598"
|
||||
editKernelLocalversion "-dos.p599"
|
||||
else echo "kernel_lge_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -570,6 +570,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
@ -583,7 +584,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p583"
|
||||
editKernelLocalversion "-dos.p584"
|
||||
else echo "kernel_moto_shamu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -661,6 +661,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -669,7 +670,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p669"
|
||||
editKernelLocalversion "-dos.p670"
|
||||
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -873,6 +873,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
@ -882,7 +883,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p882"
|
||||
editKernelLocalversion "-dos.p883"
|
||||
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -702,6 +702,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -711,7 +712,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p711"
|
||||
editKernelLocalversion "-dos.p712"
|
||||
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -861,6 +861,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
@ -870,7 +871,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p870"
|
||||
editKernelLocalversion "-dos.p871"
|
||||
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -535,11 +535,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p539"
|
||||
editKernelLocalversion "-dos.p540"
|
||||
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -608,6 +608,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
@ -618,7 +619,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p618"
|
||||
editKernelLocalversion "-dos.p619"
|
||||
else echo "kernel_samsung_jf is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -690,6 +690,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
||||
@ -702,7 +703,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p702"
|
||||
editKernelLocalversion "-dos.p703"
|
||||
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -421,10 +421,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p424"
|
||||
editKernelLocalversion "-dos.p425"
|
||||
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -531,11 +531,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p535"
|
||||
editKernelLocalversion "-dos.p539"
|
||||
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1019,7 +1019,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36015/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
@ -1090,18 +1090,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
|
||||
@ -1144,6 +1144,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
@ -1154,7 +1159,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1154"
|
||||
editKernelLocalversion "-dos.p1159"
|
||||
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -556,6 +556,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
@ -563,7 +567,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p563"
|
||||
editKernelLocalversion "-dos.p567"
|
||||
else echo "kernel_essential_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -331,7 +331,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.14/0009.patch
|
||||
@ -390,19 +390,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.14/0009.patch
|
||||
@ -439,6 +439,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -448,7 +453,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p448"
|
||||
editKernelLocalversion "-dos.p453"
|
||||
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -446,13 +446,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p452"
|
||||
editKernelLocalversion "-dos.p458"
|
||||
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -509,11 +509,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p513"
|
||||
editKernelLocalversion "-dos.p517"
|
||||
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -446,13 +446,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p452"
|
||||
editKernelLocalversion "-dos.p458"
|
||||
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -933,6 +933,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43889/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43907/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43908/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
|
||||
@ -942,7 +951,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
|
||||
editKernelLocalversion "-dos.p942"
|
||||
editKernelLocalversion "-dos.p951"
|
||||
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -931,6 +931,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43889/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43907/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43908/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
|
||||
@ -940,7 +949,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
|
||||
editKernelLocalversion "-dos.p940"
|
||||
editKernelLocalversion "-dos.p949"
|
||||
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -308,7 +308,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36015/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
@ -383,20 +383,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41006/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
|
||||
@ -443,12 +443,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p448"
|
||||
editKernelLocalversion "-dos.p454"
|
||||
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -331,7 +331,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.14/0009.patch
|
||||
@ -389,19 +389,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.14/0009.patch
|
||||
@ -438,6 +438,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -447,7 +452,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p447"
|
||||
editKernelLocalversion "-dos.p452"
|
||||
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -658,13 +658,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p664"
|
||||
editKernelLocalversion "-dos.p670"
|
||||
else echo "kernel_google_redbull is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -525,6 +525,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
@ -532,7 +536,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p532"
|
||||
editKernelLocalversion "-dos.p536"
|
||||
else echo "kernel_google_wahoo is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -509,11 +509,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p513"
|
||||
editKernelLocalversion "-dos.p517"
|
||||
else echo "kernel_lge_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -513,11 +513,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p517"
|
||||
editKernelLocalversion "-dos.p521"
|
||||
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -335,7 +335,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.14/0009.patch
|
||||
@ -394,19 +394,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.14/0009.patch
|
||||
@ -445,6 +445,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -454,7 +459,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p454"
|
||||
editKernelLocalversion "-dos.p459"
|
||||
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -498,13 +498,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p504"
|
||||
editKernelLocalversion "-dos.p510"
|
||||
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -984,7 +984,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36015/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
@ -1055,18 +1055,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
|
||||
@ -1109,6 +1109,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
@ -1118,7 +1123,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1118"
|
||||
editKernelLocalversion "-dos.p1123"
|
||||
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -444,13 +444,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p450"
|
||||
editKernelLocalversion "-dos.p456"
|
||||
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -542,6 +542,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43894/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43908/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
|
||||
@ -552,7 +560,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
|
||||
editKernelLocalversion "-dos.p552"
|
||||
editKernelLocalversion "-dos.p560"
|
||||
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -509,11 +509,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p513"
|
||||
editKernelLocalversion "-dos.p517"
|
||||
else echo "kernel_razer_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -331,7 +331,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.14/0009.patch
|
||||
@ -390,19 +390,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.14/0009.patch
|
||||
@ -441,6 +441,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -450,7 +455,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p450"
|
||||
editKernelLocalversion "-dos.p455"
|
||||
else echo "kernel_razer_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -1013,17 +1013,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.14/0009.patch
|
||||
@ -1057,6 +1057,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||
@ -1065,7 +1069,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1065"
|
||||
editKernelLocalversion "-dos.p1069"
|
||||
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -524,11 +524,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p528"
|
||||
editKernelLocalversion "-dos.p532"
|
||||
else echo "kernel_sony_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -823,7 +823,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.14/0009.patch
|
||||
@ -880,17 +880,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.14/0009.patch
|
||||
@ -925,6 +925,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -936,7 +940,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p936"
|
||||
editKernelLocalversion "-dos.p940"
|
||||
else echo "kernel_sony_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -330,7 +330,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.14/0009.patch
|
||||
@ -389,19 +389,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.14/0009.patch
|
||||
@ -438,6 +438,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -447,7 +452,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p447"
|
||||
editKernelLocalversion "-dos.p452"
|
||||
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -340,7 +340,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.14/0009.patch
|
||||
@ -399,19 +399,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.14/0009.patch
|
||||
@ -448,6 +448,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -457,7 +462,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p457"
|
||||
editKernelLocalversion "-dos.p462"
|
||||
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -343,7 +343,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36015/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
@ -419,20 +419,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41006/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
|
||||
@ -480,12 +480,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p485"
|
||||
editKernelLocalversion "-dos.p491"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -328,10 +328,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p331"
|
||||
editKernelLocalversion "-dos.p337"
|
||||
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -345,7 +345,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36015/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36286/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.14/0009.patch
|
||||
@ -421,20 +421,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41006/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/4.14/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
|
||||
@ -482,12 +482,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p487"
|
||||
editKernelLocalversion "-dos.p493"
|
||||
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -524,12 +524,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p529"
|
||||
editKernelLocalversion "-dos.p533"
|
||||
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
Loading…
Reference in New Issue
Block a user