mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
Update CVE patchers
TODO: adjust min version of CVE-2023-4132 Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
parent
df40b2cf01
commit
180280b233
@ -1 +1 @@
|
||||
Subproject commit 112812ddb17fa137ae420561db57758f70cdc719
|
||||
Subproject commit 80ae4bdadf693a294de2d59ba606632e7d1af5e1
|
@ -134,7 +134,7 @@ done
|
||||
declare -a fourDotFour=("${threeDotEighteen[@]}" "android_kernel_essential_msm8998.sh" "android_kernel_fxtec_msm8998.sh" "android_kernel_lge_msm8996.sh" "android_kernel_zuk_msm8996.sh" "android_kernel_xiaomi_sdm660.sh" "android_kernel_sony_sdm660.sh" "android_kernel_razer_msm8998.sh" "android_kernel_oneplus_msm8998.sh" "android_kernel_google_wahoo.sh" "android_kernel_yandex_sdm660.sh" "android_kernel_zuk_msm8996.sh");
|
||||
for script in "${fourDotFour[@]}"
|
||||
do
|
||||
commentPatches $script "CVE-2023-2513";
|
||||
commentPatches $script "CVE-2023-2513" "CVE-2023-4132";
|
||||
done
|
||||
#4.9
|
||||
declare -a fourDotNine=("${fourDotFour[@]}" "android_kernel_fairphone_sdm632.sh" "android_kernel_google_msm-4.9.sh" "android_kernel_oneplus_sdm845.sh" "android_kernel_razer_sdm845.sh" "android_kernel_samsung_exynos9810.sh" "android_kernel_samsung_universal9810.sh" "android_kernel_sony_sdm845.sh" "android_kernel_xiaomi_msm8937.sh" "android_kernel_xiaomi_sdm845.sh");
|
||||
|
@ -560,6 +560,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -572,7 +574,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p572"
|
||||
editKernelLocalversion "-dos.p574"
|
||||
else echo "kernel_htc_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -647,6 +647,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -658,7 +660,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p658"
|
||||
editKernelLocalversion "-dos.p660"
|
||||
else echo "kernel_lge_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -767,6 +767,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
@ -780,7 +782,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p780"
|
||||
editKernelLocalversion "-dos.p782"
|
||||
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -652,6 +652,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -670,7 +672,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p670"
|
||||
editKernelLocalversion "-dos.p672"
|
||||
else echo "kernel_asus_fugu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -454,6 +454,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -464,7 +466,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p464"
|
||||
editKernelLocalversion "-dos.p466"
|
||||
else echo "kernel_asus_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -727,6 +727,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
@ -744,7 +746,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p744"
|
||||
editKernelLocalversion "-dos.p746"
|
||||
else echo "kernel_google_dragon is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -449,6 +449,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -460,7 +462,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p460"
|
||||
editKernelLocalversion "-dos.p462"
|
||||
else echo "kernel_htc_flounder is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -577,6 +577,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -589,7 +591,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p589"
|
||||
editKernelLocalversion "-dos.p591"
|
||||
else echo "kernel_huawei_angler is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -588,6 +588,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -600,7 +602,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p600"
|
||||
editKernelLocalversion "-dos.p602"
|
||||
else echo "kernel_lge_bullhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -708,6 +708,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
@ -720,7 +722,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p720"
|
||||
editKernelLocalversion "-dos.p722"
|
||||
else echo "kernel_zte_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -451,6 +451,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -461,7 +463,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p461"
|
||||
editKernelLocalversion "-dos.p463"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -500,6 +500,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -510,7 +512,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p510"
|
||||
editKernelLocalversion "-dos.p512"
|
||||
else echo "kernel_google_yellowstone is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -303,6 +303,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -315,7 +317,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p315"
|
||||
editKernelLocalversion "-dos.p317"
|
||||
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -451,6 +451,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -461,7 +463,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p461"
|
||||
editKernelLocalversion "-dos.p463"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -504,6 +504,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -513,7 +515,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p513"
|
||||
editKernelLocalversion "-dos.p515"
|
||||
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -421,6 +421,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -430,7 +432,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p430"
|
||||
editKernelLocalversion "-dos.p432"
|
||||
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -423,6 +423,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -432,7 +434,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p432"
|
||||
editKernelLocalversion "-dos.p434"
|
||||
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -387,6 +387,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22387/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
@ -404,7 +407,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
editKernelLocalversion "-dos.p404"
|
||||
editKernelLocalversion "-dos.p407"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -437,6 +437,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch
|
||||
@ -454,7 +456,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p454"
|
||||
editKernelLocalversion "-dos.p456"
|
||||
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -525,6 +525,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
@ -539,7 +541,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p539"
|
||||
editKernelLocalversion "-dos.p541"
|
||||
else echo "kernel_google_marlin is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -337,6 +337,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -350,7 +352,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p350"
|
||||
editKernelLocalversion "-dos.p352"
|
||||
else echo "kernel_moto_shamu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -538,6 +538,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
@ -550,7 +552,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p550"
|
||||
editKernelLocalversion "-dos.p552"
|
||||
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -474,6 +474,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
@ -483,7 +485,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p483"
|
||||
editKernelLocalversion "-dos.p485"
|
||||
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -526,6 +526,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
|
||||
@ -538,7 +540,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p538"
|
||||
editKernelLocalversion "-dos.p540"
|
||||
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -173,6 +173,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.4/0002.patch
|
||||
@ -186,7 +188,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p186"
|
||||
editKernelLocalversion "-dos.p188"
|
||||
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -433,6 +433,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch
|
||||
@ -451,7 +453,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p451"
|
||||
editKernelLocalversion "-dos.p453"
|
||||
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -160,6 +160,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
@ -170,7 +172,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p170"
|
||||
editKernelLocalversion "-dos.p172"
|
||||
else echo "kernel_lge_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -179,6 +179,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.4/0002.patch
|
||||
@ -192,7 +194,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p192"
|
||||
editKernelLocalversion "-dos.p194"
|
||||
else echo "kernel_sony_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -484,6 +484,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22387/ANY/0003.patch
|
||||
@ -505,7 +508,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p505"
|
||||
editKernelLocalversion "-dos.p508"
|
||||
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -550,6 +550,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3220/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22386/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22387/ANY/0003.patch
|
||||
@ -578,7 +583,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22095/ANY/0001.patch
|
||||
editKernelLocalversion "-dos.p578"
|
||||
editKernelLocalversion "-dos.p583"
|
||||
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -209,6 +209,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch
|
||||
@ -223,7 +225,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
editKernelLocalversion "-dos.p223"
|
||||
editKernelLocalversion "-dos.p225"
|
||||
else echo "kernel_essential_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -99,6 +99,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
|
||||
@ -110,7 +113,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p110"
|
||||
editKernelLocalversion "-dos.p113"
|
||||
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -77,9 +77,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p79"
|
||||
editKernelLocalversion "-dos.p83"
|
||||
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -160,6 +160,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
@ -170,7 +172,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p170"
|
||||
editKernelLocalversion "-dos.p172"
|
||||
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -77,9 +77,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p79"
|
||||
editKernelLocalversion "-dos.p83"
|
||||
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -48,6 +48,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3114/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3344/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/^6.0/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3606/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3623/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3643/5.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3643/5.10/0008.patch
|
||||
@ -100,6 +101,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2483/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3117/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/5.10/0002.patch
|
||||
@ -109,8 +111,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3389/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4004/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21400/5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22998/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22998/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
@ -128,14 +137,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32233/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35788/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35826/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35829/5.10/0002.patch
|
||||
editKernelLocalversion "-dos.p135"
|
||||
editKernelLocalversion "-dos.p144"
|
||||
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -48,6 +48,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3114/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3344/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3577/^6.0/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3606/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3623/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3643/5.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3643/5.10/0008.patch
|
||||
@ -100,6 +101,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2483/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3117/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/5.10/0002.patch
|
||||
@ -109,8 +111,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3389/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4004/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21400/5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22998/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22998/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
@ -128,14 +137,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32233/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35788/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35826/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35829/5.10/0002.patch
|
||||
editKernelLocalversion "-dos.p135"
|
||||
editKernelLocalversion "-dos.p144"
|
||||
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -106,6 +106,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.14/0002.patch
|
||||
@ -119,7 +122,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.14/0003.patch
|
||||
editKernelLocalversion "-dos.p119"
|
||||
editKernelLocalversion "-dos.p122"
|
||||
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -105,6 +105,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
|
||||
@ -116,7 +119,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p116"
|
||||
editKernelLocalversion "-dos.p119"
|
||||
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -117,6 +117,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3220/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22386/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
@ -137,7 +142,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35788/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p137"
|
||||
editKernelLocalversion "-dos.p142"
|
||||
else echo "kernel_google_redbull is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -173,6 +173,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch
|
||||
@ -187,7 +189,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
editKernelLocalversion "-dos.p187"
|
||||
editKernelLocalversion "-dos.p189"
|
||||
else echo "kernel_google_wahoo is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -160,6 +160,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
@ -170,7 +172,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p170"
|
||||
editKernelLocalversion "-dos.p172"
|
||||
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -99,6 +99,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
|
||||
@ -110,7 +113,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p110"
|
||||
editKernelLocalversion "-dos.p113"
|
||||
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -96,6 +96,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3220/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21665/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21666/ANY/0001.patch
|
||||
@ -111,7 +116,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35788/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p111"
|
||||
editKernelLocalversion "-dos.p116"
|
||||
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -451,6 +451,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22387/ANY/0003.patch
|
||||
@ -471,7 +474,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p471"
|
||||
editKernelLocalversion "-dos.p474"
|
||||
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -75,9 +75,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p77"
|
||||
editKernelLocalversion "-dos.p81"
|
||||
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -33,19 +33,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2124/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2166/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3338/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/5.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32233/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35788/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/5.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35826/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/5.4/0005.patch
|
||||
editKernelLocalversion "-dos.p45"
|
||||
editKernelLocalversion "-dos.p50"
|
||||
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -160,6 +160,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
|
||||
@ -170,7 +172,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p170"
|
||||
editKernelLocalversion "-dos.p172"
|
||||
else echo "kernel_razer_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -99,6 +99,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
|
||||
@ -110,7 +113,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p110"
|
||||
editKernelLocalversion "-dos.p113"
|
||||
else echo "kernel_razer_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -580,6 +580,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28772/4.9/0005.patch
|
||||
@ -593,7 +596,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.pat
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p593"
|
||||
editKernelLocalversion "-dos.p596"
|
||||
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -413,6 +413,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22387/ANY/0004.patch
|
||||
@ -432,7 +435,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.pat
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p432"
|
||||
editKernelLocalversion "-dos.p435"
|
||||
else echo "kernel_sony_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -97,6 +97,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22387/ANY/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
|
||||
@ -109,7 +112,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p109"
|
||||
editKernelLocalversion "-dos.p112"
|
||||
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -101,6 +101,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
|
||||
@ -112,7 +115,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p112"
|
||||
editKernelLocalversion "-dos.p115"
|
||||
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -83,6 +83,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3611/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/^6.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32233/4.19/0002.patch
|
||||
@ -91,7 +95,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35788/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p91"
|
||||
editKernelLocalversion "-dos.p95"
|
||||
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
Loading…
Reference in New Issue
Block a user