Update CVE patchers

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-07-24 17:24:31 -04:00
parent 1f65053495
commit 33ee2a1c28
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
16 changed files with 18 additions and 27 deletions

View File

@ -68,7 +68,7 @@ external/caliper 4a0d9aba0856d0aa965d5653bfa4c138f0e8a8ba
external/cblas d063db8bdddfcde61e4bad3bfe65941fd73e8094
external/chromium-libpac 0ac78251d11006d764ba1aad8cc0867827fafe5c
external/chromium-trace 8b2c0074e71a8086dee98ca8730acfdc5eddf7a1
external/chromium-webview 170a4ad46bc61af284392a04dda7dc378a638976
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/clang 751a76679b0fb5798ea6cab75906df07edcab315
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
external/compiler-rt 0c46c9e892a3f68420635032ef2f6152dabd197c

View File

@ -67,7 +67,7 @@ external/capstone 6788a4139092f179005f7cdbf181ba24b60b6113
external/cblas ddf5f49cb53866fbc503a6349bf44bac24a6963d
external/chromium-libpac dff5ddb8d28f6ac9a86eb28763b4313f6f72eec5
external/chromium-trace b2cf025c7d5cebd43084f38c6c7ff9cc17da428a
external/chromium-webview 170a4ad46bc61af284392a04dda7dc378a638976
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/clang f9d2af42fc6d74c28893af371e4647158eaba66c
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
external/cn-cbor 7fe9f01990a97be4df5e46d2decd894c06678072

View File

@ -78,7 +78,7 @@ external/catch2 bcfbb791d09e390fb545c03ca002e570f764d960
external/cblas 61ee00692011385347a5dd1ad872556899a5cf7a
external/chromium-libpac c98fc96035e6fdc5b84d953d2bd38d2dcd175467
external/chromium-trace f4e722b911fcc6f7164026432de62a02ea3460fb
external/chromium-webview 170a4ad46bc61af284392a04dda7dc378a638976
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/clang 8343f599c9e1dda8e6c1bb779af323a673a052f9
external/cldr 4e0bdd442c1e01f5c6147cf6032ce4f8587f4ede
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4

View File

@ -135,7 +135,7 @@ external/cblas d82c5f4ae14b2a5468303985070f7dadc15d4094
external/cbor-java f81e576298790c97498311e99a0b0b34653c3dd8
external/chromium-libpac 169c93e00a00605346a68d39d3f4713735bdb61e
external/chromium-trace e524766cad26d677a9a1ec8c00c512d4cac2cf5e
external/chromium-webview 170a4ad46bc61af284392a04dda7dc378a638976
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/clang 0a1c53a5d295109bd4702ad13c0f2a5510ca1b26
external/cldr 38850463abd624d5b2293be75fddc43cf6b55ae2
external/cn-cbor 696530332036f5518681d3c450cdbc3ee412004a

View File

@ -94,7 +94,7 @@ external/catch2 2b2e0e9540defee10f28ea0fc97750490fa238b5
external/cblas 2b24922070cb6d45edd5f5b533db0637099a2b17
external/cbor-java 00c4a382dd3810f9c1b363eaad339cff34a3f6fe
external/chromium-trace 138ade68f9d3388a1b0a6d9ce5e091ff6f7e7448
external/chromium-webview 170a4ad46bc61af284392a04dda7dc378a638976
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/clang f1cef8e77ae220c9379303bdc9896e0c2366bd6f
external/cldr 242ecd0dcb21f3376f825119ec0b36fcb15e7bb8
external/cn-cbor 6a0f6a5375b8cd9b495e91c11d21ed257ec9a905

View File

@ -201,7 +201,7 @@ external/catch2 5f8628024c5a9219caa004d6a9547aacd9ba94c1
external/cblas 4fdeda64177f60e1b226349885b3c0ea016f3068
external/cbor-java 6b4b6adc5ff8f91e2ddef14adf510e14aaf90204
external/chromium-trace 9456b95a6d4b95c765c9f2264a71b0334f6cf8d7
external/chromium-webview 170a4ad46bc61af284392a04dda7dc378a638976
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/clang 9fae335badf26813486d207b69928d38b979e522
external/cldr 7518f37169bd87d6977244e4d7471bc48fcd62e0
external/cn-cbor 7b581886d1830f50c3ab104a56b7ab931779466f
@ -1108,7 +1108,7 @@ packages/apps/Traceur f1f531bd3dd414aa6b8d81d517b3c6c9164a657b
packages/apps/Trebuchet 4d6edfeef832f44d6b747aad4785baf8953ed5ee
packages/apps/TvSettings 82d09fbb7635d4eaf4496925768697f272614abc
packages/apps/UniversalMediaPlayer a56170cac624f5cd5b5344de8a24b074049d9076
packages/apps/Updater 663e87c082aed3f91631166d32754ef7ddd946aa
packages/apps/Updater 4a9f7a891bcce2530fec304975cf7ce38fad4dde
packages/apps/WallpaperPicker 5b6254f657aa278f874b819f8de2edeb59acf85c
packages/apps/WallpaperPicker2 87e1441dc8743a3518d92f941e6f784c9eedc5c1
packages/inputmethods/LatinIME 9f52c6ea6d1f1820dd5aa707058a87ab51c0e653
@ -1380,7 +1380,7 @@ vendor/lge/us996d 548f96ba5e97624c00650fd218e985aaf7b8424c
vendor/lge/us997 1bdb1edf78b5b86972a61c8e51294b5905c36e77
vendor/lge/v20-common 1493693b4de2e304ba5271022236fad1aa969a4f
vendor/lge/vs995 86a35d3e47c9de58c55a8c6dd5438638e3525776
vendor/lineage 7dcea8e776df2b19afb32394b068672741fc1a00
vendor/lineage cb2a723cf75fde1222137a461aaeb683a53b667d
vendor/nxp/nfc 7cfaa9b365f43eef984d0c3c11a14ceffdd7c666
vendor/nxp/secure_element c1327d2dc2f1119a0e226c4a97d039ffc874b023
vendor/nxp/secure_element_extns 9794c73f5a5b37116d6a161c4252c82c7ecf0ba0

@ -1 +1 @@
Subproject commit 25dbfb517cc4b5863e06a7d19e9a6b077b43e307
Subproject commit ca8b3319c5fec9d56cbd7230f7c065a53fe6cf34

View File

@ -355,7 +355,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40911/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
@ -383,7 +382,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p383"
editKernelLocalversion "-dos.p382"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -355,7 +355,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40911/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
@ -383,7 +382,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p383"
editKernelLocalversion "-dos.p382"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -758,7 +758,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40905/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40910/^6.10/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40911/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
@ -798,7 +797,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
editKernelLocalversion "-dos.p798"
editKernelLocalversion "-dos.p797"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -756,7 +756,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40905/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40910/^6.10/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40911/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
@ -796,7 +795,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
editKernelLocalversion "-dos.p796"
editKernelLocalversion "-dos.p795"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -556,7 +556,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40911/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
@ -582,7 +581,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p582"
editKernelLocalversion "-dos.p581"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -407,7 +407,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40911/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
@ -434,7 +433,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p434"
editKernelLocalversion "-dos.p433"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -353,7 +353,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40911/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
@ -381,7 +380,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p381"
editKernelLocalversion "-dos.p380"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -410,7 +410,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40901/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40905/5.4/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40911/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
@ -446,7 +445,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
editKernelLocalversion "-dos.p446"
editKernelLocalversion "-dos.p445"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -238,7 +238,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40911/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
@ -262,7 +261,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40993/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
editKernelLocalversion "-dos.p262"
editKernelLocalversion "-dos.p261"
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"