Update CVE patchers

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-07-02 09:50:28 -04:00
parent a7ce9de6e8
commit 1e2d7e9218
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
12 changed files with 37 additions and 27 deletions

View File

@ -2,11 +2,11 @@ android 607a01a914cbddf0d421402f571c835548581b52
art aeeafbd459298788c7760f35d04e7c0568d192b5
bionic e0aac7df6f58138dae903b5d456c947a3f8092ea
bootable/libbootloader 6e3710f107248dfbefbf79aaf81caca73a742cab
bootable/recovery 8904d2a254c5263caded20af8fde209f8b37f22d
bootable/recovery 4c1835f494be558f71c84e3abceb3d773f6c6369
build/bazel 9898ac01c9525bf91d23a1c2b83fc401603cb6d3
build/bazel_common_rules f6cf03f7d0ba2e7cb05c0109a5cd57aae07dc6e8
build/blueprint ca8f0e8e3571c866d69d34cbd47b3989abe8e8cd
build/make 26afa6d38a151c8a4acce0e28564d47f7713849d
build/make dede32071bc7b5b74af31e7deaa6c178af019bde
build/pesto d554620e6f7ad178b71ebb8c4269830cbd24ad8c
build/soong c80e6e3b82f2c0fded69b44b514d4c4d5519c9b5
cts 5f6e2dedd307f20dcf663ae17ab5db8664092430
@ -1029,9 +1029,9 @@ kernel/xiaomi/vayu 6c9febddfbd505b760d12f585288cf7612ad57d8
kernel/zuk/msm8996 cc57cb4ee3b7918b74d30604735d353b9a5fa23b
libcore 2a7d66adbcde1862f9295ae0a13f1751b193e4d7
libnativehelper 49ecc5f1e97e810d27e2c6558abdde49e875349b
lineage-sdk b0a28220c5d6d0d13d5a60da4a80538079721e30
lineage-sdk 6e45a0210999b9e87ce18450240a77be5130564a
lineage/scripts 917a81e70ee73105c6f52eda9a9443becd7a8cdc
packages/apps/Aperture 5d68af56eb88d663c54f083b117ad9911daaf193
packages/apps/Aperture 1afb9eea0a41e1b9cba5d91efee6a035c5e9318b
packages/apps/AudioFX 15e2a666d21551698ea0744996abcdc35e6c0cc1
packages/apps/Backgrounds 3b5c676d5a2747e92b14a79707c0aa3a6339bd4f
packages/apps/BasicSmsReceiver ae8e590ae7856e3007fe2b78489894a5fbf3f36a
@ -1061,21 +1061,21 @@ packages/apps/CarrierConfig2 e710a67ed64620fc11f62520cceef4bba64dc2a6
packages/apps/CellBroadcastReceiver 3d7340eeac82125cd9091fc368a031e98f4db7fd
packages/apps/CertInstaller 98a80cd7f6f9ad8b46acb5c4798fd2d9253d37c4
packages/apps/Contacts 643d0cb2481a46bfba3c2c0d778024750d7916ae
packages/apps/DeskClock d6af44dabe246b2c4357b53d5ede8beec785ba05
packages/apps/Dialer 712509ed6c9cad150536e679d11ff93e1e6c9d88
packages/apps/DeskClock 8e3a5a8312a06117fadd0c230711fe13a94ea381
packages/apps/Dialer b986b70fc118dff016bb3d9dea2a2fb08b7f7f8b
packages/apps/DocumentsUI 0458482621fcdca3ee3938b3813f8d17421d62e0
packages/apps/ElmyraService cb1a517757b174a3c472c7eb6392769a10cdbc8b
packages/apps/EmergencyInfo e8fe444bd8f8d9b807ed9da969d4147896af6142
packages/apps/Etar 8fe2cb35840eb05f44d96a092d19d5dd5b6402b8
packages/apps/Etar b764cf54e48bfb8f85beb8a8e7843924ad26ed21
packages/apps/ExactCalculator 92dd1417a6af570904e0d8c422f5a961ec693754
packages/apps/FMRadio 1d304d4bb6c4b0d53758622cd7ce2d71795e1dbe
packages/apps/FlipFlap 7c4c66d9032ae9d9656581949e767bb78682539b
packages/apps/FlipFlap 2a3cdf5470eacac157707e10d99109fd34b03586
packages/apps/Gallery2 bca6838e1944f5b80e04cc90a85213270cf3477c
packages/apps/HTMLViewer 40ee5730f96f840b1be7cbe8daabddd543eba49b
packages/apps/ImsServiceEntitlement 79a64a6e1d2602e81977a628ae385002bddd9e89
packages/apps/KeyChain d90f056762b0390f0c1a9823af51894f14a9f746
packages/apps/LineageCustomizer 6d78f750ddfe8b7b5821a9ce83860755491b8bd8
packages/apps/LineageParts 5738df55876d78bd5a2dd45e37a7cdbec13b66c8
packages/apps/LineageParts 43b2b0ad46bf2ddae071eff0666d688d1194b7b5
packages/apps/ManagedProvisioning 4986c737e21b57a0545a4ba4f63be02e26f09243
packages/apps/Messaging bab56b560faa0a53a452020ac571f6c6996a4ecf
packages/apps/Nfc c28555164b8d2c8e12d7d4439f1ce9d83b9655ab
@ -1085,14 +1085,14 @@ packages/apps/PhoneCommon f44c97cc5c6de1c980694af76d1692157dd50a0c
packages/apps/Profiles 78318ee404725fb9cace4b9af7e78761035b321c
packages/apps/Provision 841d5199e1d1c64e7853fd953eed5247780908c1
packages/apps/QuickAccessWallet ad935df93a556861473b3b411e255b4165d67fc0
packages/apps/Recorder 5ef85ee3663811e1053f2aaf82ed978669c5d1af
packages/apps/Recorder cdbc090b915989900d40b2d89fd1e737e5631e43
packages/apps/RemoteProvisioner 06d16c8031ce54bff1a07cc64f8b02140a3753c1
packages/apps/SafetyRegulatoryInfo f5dfd6ab7ea6aaa1a0014106110733e316379e95
packages/apps/SecureElement 7e9d165899058103fa612ffb41858e4fd975182b
packages/apps/Seedvault e03ad756817631611b7497d9fe7b2173e2756b9d
packages/apps/Settings 1e4d60d4425868db0a27a6a1225f791048bfebfd
packages/apps/SettingsIntelligence 4ef92f41721f25bbdec5c0b2433547ef323e72ac
packages/apps/SetupWizard c7522b7aae6394711417818fe80c09c70fe547ca
packages/apps/SetupWizard 0880f18b4a513681961f0ad0dd22d756e2a58fa1
packages/apps/SimpleDeviceConfig 82d31b18dd2550e05f89248f128cb571eecc863a
packages/apps/SimpleSettingsConfig f5620aa22a44ac3a9794d0fda5c146efd7e0a11e
packages/apps/Stk 9cbb287404fb15a3a13c63f15b73962cdd18529d
@ -1105,7 +1105,7 @@ packages/apps/ThemePicker a6f6713edd80bff058dda9ba9b093a9f61e29d42
packages/apps/TimeZoneData 498c5148458a63598417d2b2369fbed3ab19331c
packages/apps/TimeZoneUpdater e862d8ef6370b8540a8dd010d9c8dcff20735af5
packages/apps/Traceur f1f531bd3dd414aa6b8d81d517b3c6c9164a657b
packages/apps/Trebuchet 0ddb317584734a22d3b1369111b3078bbf4dd7a6
packages/apps/Trebuchet 4d6edfeef832f44d6b747aad4785baf8953ed5ee
packages/apps/TvSettings 82d09fbb7635d4eaf4496925768697f272614abc
packages/apps/UniversalMediaPlayer a56170cac624f5cd5b5344de8a24b074049d9076
packages/apps/Updater 663e87c082aed3f91631166d32754ef7ddd946aa
@ -1159,7 +1159,7 @@ packages/providers/PartnerBookmarksProvider d982e500f09447d000f2ca67782831cc6b59
packages/providers/TelephonyProvider 64aa1787b56d1e9b03bcd18dc652aa7a395c4db0
packages/providers/TvProvider c0e54c118bc93bce2f3edaa5fa9c59089c896dc8
packages/providers/UserDictionaryProvider 1a5d6d4997847e0ec2040be5cb9a7efaf1620e72
packages/resources/devicesettings de75bc1d53a7d75be8913de8c8f7af846b78469f
packages/resources/devicesettings 798b9890c32d993fe5da6f85776ff916c189aa22
packages/screensavers/Basic d3aaa026dc3eaf7a249c1a00c1a0524e9c1bb349
packages/screensavers/PhotoTable d5a731373f32b698776402bae8ff09a9676b6bb1
packages/services/AlternativeNetworkAccess dc09bf9c4b5652ef0096e4991f565854160395af
@ -1245,7 +1245,7 @@ system/bpfprogs 9f98f4c7cd2dca329bdb840f5d801756926b4bf9
system/ca-certificates d3ca0597845854fb6ae628ae99fc8e2b9dbb8f2f
system/chre 0aa5a0b934e84d6ffd162a24bb3ce78b49b60437
system/connectivity/wificond d9c99fa71ce203759eb0b293c8ef77589fd5f866
system/core af18250d0814a2d3b4abcdcd9c0391290eb6abb8
system/core 355d2dfd28e68fe27aef38deb3daf8f914816940
system/dmesgd 45b6106898f6bca88d66639354b536d770d1c53c
system/extras 5cf17c20bc8fe2fea5531ec877ea825bab2bec7a
system/gatekeeper a7af87e5bf47a1b3ae2945c09f466d476d89a229
@ -1337,7 +1337,7 @@ tools/tradefederation/prebuilts dcb8956ae70359e7f554b9eb50e185d2a7feb6cd
tools/treble d74b74010472ba957f4125b676a41c23ca91e549
tools/trebuchet 9ff3c1fd3ea48b7c148fc1f6e2456dbc5596ca8d
vendor/codeaurora/telephony ebdb27e3a6d9f94aed27dee2819829a3d656ad20
vendor/crowdin bded17f4e6771f759718cfd975659261750298dd
vendor/crowdin 5c7c1a74f982aa68f31739f8ead9434fd6bcb15d
vendor/essential/mata 3e37777606e559f33c9e1d247b15de1fac359fe5
vendor/fairphone/FP3 6ebc77ace3dce27e03973ddb4bb9629de576cdd7
vendor/fairphone/FP4 6482b251c7c1620cbc85d513cfd12fce70ff6eb6
@ -1380,7 +1380,7 @@ vendor/lge/us996d 548f96ba5e97624c00650fd218e985aaf7b8424c
vendor/lge/us997 1bdb1edf78b5b86972a61c8e51294b5905c36e77
vendor/lge/v20-common 1493693b4de2e304ba5271022236fad1aa969a4f
vendor/lge/vs995 86a35d3e47c9de58c55a8c6dd5438638e3525776
vendor/lineage 452a5d6209ca62ca1275737bbb319678a4006f8a
vendor/lineage 7dcea8e776df2b19afb32394b068672741fc1a00
vendor/nxp/nfc 7cfaa9b365f43eef984d0c3c11a14ceffdd7c666
vendor/nxp/secure_element c1327d2dc2f1119a0e226c4a97d039ffc874b023
vendor/nxp/secure_element_extns 9794c73f5a5b37116d6a161c4252c82c7ecf0ba0

@ -1 +1 @@
Subproject commit 92eeaad2b8dcb1ae1cce0af09dc064295bc3333e
Subproject commit 0d85b40ce208cdd87f3ea71a9f3d3aa3c9a08f52

View File

@ -212,6 +212,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086-alt/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23373/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.19/0003.patch
@ -346,7 +347,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p346"
editKernelLocalversion "-dos.p347"
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -138,6 +138,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
@ -342,7 +343,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p342"
editKernelLocalversion "-dos.p343"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -138,6 +138,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
@ -342,7 +343,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p342"
editKernelLocalversion "-dos.p343"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -329,6 +329,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
@ -541,7 +542,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p541"
editKernelLocalversion "-dos.p542"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -213,6 +213,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086-alt/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23373/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.19/0003.patch
@ -350,7 +351,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p350"
editKernelLocalversion "-dos.p351"
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -166,6 +166,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
@ -393,7 +394,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p393"
editKernelLocalversion "-dos.p394"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -136,6 +136,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
@ -340,7 +341,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p340"
editKernelLocalversion "-dos.p341"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -690,6 +690,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086-alt/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23373/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.19/0003.patch
@ -821,7 +822,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p821"
editKernelLocalversion "-dos.p822"
else echo "kernel_sony_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -210,6 +210,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086-alt/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23373/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.19/0003.patch
@ -346,7 +347,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p346"
editKernelLocalversion "-dos.p347"
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -216,6 +216,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086-alt/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23373/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.19/0003.patch
@ -353,7 +354,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p353"
editKernelLocalversion "-dos.p354"
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"