mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
Update CVE patchers
Potential breakage Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
20c8abcbc1
commit
45e87b4a1c
@ -1 +1 @@
|
||||
Subproject commit eebf60fff175260ba9b3483c7280abd50e32e8e7
|
||||
Subproject commit 610296a4e6ed4d18a4a62c604245d477401712fd
|
@ -669,6 +669,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
@ -821,7 +822,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p821"
|
||||
editKernelLocalversion "-dos.p822"
|
||||
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -338,6 +338,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
@ -473,13 +474,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p479"
|
||||
editKernelLocalversion "-dos.p481"
|
||||
else echo "kernel_asus_grouper is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -351,6 +351,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
@ -509,6 +510,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
@ -516,7 +518,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p516"
|
||||
editKernelLocalversion "-dos.p518"
|
||||
else echo "kernel_htc_msm8960 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -425,6 +425,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
@ -512,6 +513,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch
|
||||
@ -582,6 +584,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
@ -591,7 +595,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p591"
|
||||
editKernelLocalversion "-dos.p595"
|
||||
else echo "kernel_htc_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -509,6 +509,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
@ -598,6 +599,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
@ -669,6 +671,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
@ -677,7 +680,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p677"
|
||||
editKernelLocalversion "-dos.p680"
|
||||
else echo "kernel_lge_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -343,6 +343,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
@ -443,6 +444,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0007.patch
|
||||
@ -530,13 +532,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p536"
|
||||
editKernelLocalversion "-dos.p540"
|
||||
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -420,6 +420,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
@ -584,6 +585,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
@ -591,7 +593,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p591"
|
||||
editKernelLocalversion "-dos.p593"
|
||||
else echo "kernel_samsung_d2 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -267,9 +267,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
editKernelLocalversion "-dos.p269"
|
||||
editKernelLocalversion "-dos.p270"
|
||||
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -254,6 +254,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
@ -387,12 +388,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p392"
|
||||
editKernelLocalversion "-dos.p394"
|
||||
else echo "kernel_samsung_manta is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -330,6 +330,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch
|
||||
@ -440,7 +441,7 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-sy
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p440"
|
||||
editKernelLocalversion "-dos.p441"
|
||||
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -322,6 +322,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
@ -433,7 +434,7 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-sy
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p433"
|
||||
editKernelLocalversion "-dos.p434"
|
||||
else echo "kernel_samsung_tuna is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -557,6 +557,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
@ -695,6 +696,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
@ -796,6 +798,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
@ -805,7 +809,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p805"
|
||||
editKernelLocalversion "-dos.p809"
|
||||
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -523,6 +523,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch
|
||||
@ -605,6 +606,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch
|
||||
@ -673,6 +675,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
@ -688,7 +691,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p688"
|
||||
editKernelLocalversion "-dos.p691"
|
||||
else echo "kernel_asus_fugu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -293,6 +293,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.4/0002.patch
|
||||
@ -391,6 +392,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0008.patch
|
||||
@ -478,6 +480,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -485,7 +489,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p485"
|
||||
editKernelLocalversion "-dos.p489"
|
||||
else echo "kernel_asus_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -515,6 +515,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
@ -655,6 +656,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43976/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
@ -756,6 +758,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
@ -769,7 +773,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p769"
|
||||
editKernelLocalversion "-dos.p773"
|
||||
else echo "kernel_google_dragon is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -317,6 +317,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
@ -401,6 +402,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch
|
||||
@ -471,6 +473,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
@ -479,7 +483,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p479"
|
||||
editKernelLocalversion "-dos.p483"
|
||||
else echo "kernel_htc_flounder is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -437,6 +437,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
@ -526,6 +527,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
@ -600,6 +602,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
@ -609,7 +612,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p609"
|
||||
editKernelLocalversion "-dos.p612"
|
||||
else echo "kernel_huawei_angler is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -441,6 +441,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
@ -534,6 +535,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
@ -611,6 +613,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
@ -620,7 +623,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p620"
|
||||
editKernelLocalversion "-dos.p623"
|
||||
else echo "kernel_lge_bullhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -475,6 +475,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch
|
||||
@ -633,6 +634,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch
|
||||
@ -741,6 +743,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
|
||||
@ -749,7 +754,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p749"
|
||||
editKernelLocalversion "-dos.p754"
|
||||
else echo "kernel_zte_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -290,6 +290,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
@ -388,6 +389,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0008.patch
|
||||
@ -476,6 +478,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -483,7 +487,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p483"
|
||||
editKernelLocalversion "-dos.p487"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -251,6 +251,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
@ -438,12 +439,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p443"
|
||||
editKernelLocalversion "-dos.p445"
|
||||
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -364,6 +364,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
@ -450,6 +451,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch
|
||||
@ -522,6 +524,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -529,7 +533,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p529"
|
||||
editKernelLocalversion "-dos.p533"
|
||||
else echo "kernel_google_yellowstone is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -177,6 +177,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch
|
||||
@ -254,6 +255,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0065.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
@ -325,6 +327,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
@ -334,7 +338,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p334"
|
||||
editKernelLocalversion "-dos.p338"
|
||||
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -290,6 +290,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
@ -388,6 +389,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0008.patch
|
||||
@ -476,6 +478,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -483,7 +487,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p483"
|
||||
editKernelLocalversion "-dos.p487"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -350,6 +350,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
@ -441,6 +442,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0011.patch
|
||||
@ -528,13 +530,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p534"
|
||||
editKernelLocalversion "-dos.p539"
|
||||
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -276,6 +276,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
@ -369,6 +370,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
@ -443,13 +445,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p449"
|
||||
editKernelLocalversion "-dos.p453"
|
||||
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -278,6 +278,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
@ -371,6 +372,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
@ -445,13 +447,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p451"
|
||||
editKernelLocalversion "-dos.p455"
|
||||
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -58,6 +58,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25162/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0008.patch
|
||||
@ -239,6 +240,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46904/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46906/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0004.patch
|
||||
@ -447,13 +451,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51042/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
editKernelLocalversion "-dos.p453"
|
||||
editKernelLocalversion "-dos.p465"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -331,6 +331,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46906/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch
|
||||
@ -485,6 +486,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||
@ -493,7 +497,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p493"
|
||||
editKernelLocalversion "-dos.p497"
|
||||
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -153,6 +153,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
|
||||
@ -253,8 +254,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p254"
|
||||
editKernelLocalversion "-dos.p256"
|
||||
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -447,6 +447,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
@ -560,6 +561,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
@ -570,7 +573,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p570"
|
||||
editKernelLocalversion "-dos.p573"
|
||||
else echo "kernel_google_marlin is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -292,6 +292,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
@ -430,6 +431,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
@ -438,7 +440,7 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a5232
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p438"
|
||||
editKernelLocalversion "-dos.p440"
|
||||
else echo "kernel_google_msm is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -356,6 +356,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
@ -540,6 +541,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||
@ -548,7 +550,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p548"
|
||||
editKernelLocalversion "-dos.p550"
|
||||
else echo "kernel_htc_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -287,6 +287,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
@ -465,12 +466,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p470"
|
||||
editKernelLocalversion "-dos.p472"
|
||||
else echo "kernel_lge_g3 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -271,6 +271,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
@ -402,13 +403,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p408"
|
||||
editKernelLocalversion "-dos.p410"
|
||||
else echo "kernel_lge_hammerhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -18,6 +18,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18193/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch
|
||||
@ -47,8 +48,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p48"
|
||||
editKernelLocalversion "-dos.p50"
|
||||
else echo "kernel_lge_mako is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -274,6 +274,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
@ -450,11 +451,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p454"
|
||||
editKernelLocalversion "-dos.p456"
|
||||
else echo "kernel_lge_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -211,6 +211,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch
|
||||
@ -286,6 +287,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0065.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch
|
||||
@ -359,7 +361,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
@ -369,7 +374,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p369"
|
||||
editKernelLocalversion "-dos.p374"
|
||||
else echo "kernel_moto_shamu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -349,6 +349,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/^5.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
@ -517,13 +518,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p523"
|
||||
editKernelLocalversion "-dos.p526"
|
||||
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -294,6 +294,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25045/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0066/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
@ -463,6 +464,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch
|
||||
@ -572,6 +574,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
@ -580,7 +585,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p580"
|
||||
editKernelLocalversion "-dos.p585"
|
||||
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -332,6 +332,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
@ -422,6 +423,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0063.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
@ -496,13 +498,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p502"
|
||||
editKernelLocalversion "-dos.p506"
|
||||
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -290,6 +290,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25045/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0066/3.18/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch
|
||||
@ -448,6 +449,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46905/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch
|
||||
@ -560,6 +562,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
@ -568,7 +573,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
editKernelLocalversion "-dos.p568"
|
||||
editKernelLocalversion "-dos.p573"
|
||||
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -246,6 +246,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch
|
||||
@ -394,9 +395,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
editKernelLocalversion "-dos.p396"
|
||||
editKernelLocalversion "-dos.p398"
|
||||
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -315,6 +315,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
@ -466,7 +467,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
@ -474,7 +477,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p474"
|
||||
editKernelLocalversion "-dos.p477"
|
||||
else echo "kernel_samsung_jf is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -395,6 +395,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0040/3.4/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.4/0002.patch
|
||||
@ -548,7 +549,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
||||
@ -558,7 +561,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
editKernelLocalversion "-dos.p558"
|
||||
editKernelLocalversion "-dos.p561"
|
||||
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -155,6 +155,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.10/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch
|
||||
@ -280,8 +281,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39193/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45862/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p281"
|
||||
editKernelLocalversion "-dos.p283"
|
||||
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -226,11 +226,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p230"
|
||||
editKernelLocalversion "-dos.p233"
|
||||
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -79,6 +79,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25162/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.14/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.14/0005.patch
|
||||
@ -338,6 +339,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44733/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46906/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0004.patch
|
||||
@ -547,16 +549,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51042/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p556"
|
||||
editKernelLocalversion "-dos.p566"
|
||||
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -259,13 +259,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
editKernelLocalversion "-dos.p265"
|
||||
editKernelLocalversion "-dos.p267"
|
||||
else echo "kernel_essential_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -134,6 +134,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
|
||||
@ -142,7 +147,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p142"
|
||||
editKernelLocalversion "-dos.p147"
|
||||
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -61,7 +61,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/^5.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -86,10 +86,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52462/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p89"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p97"
|
||||
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -203,11 +203,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p207"
|
||||
editKernelLocalversion "-dos.p210"
|
||||
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -61,7 +61,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/^5.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -86,10 +86,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52462/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p89"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p97"
|
||||
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -198,16 +198,42 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51779/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52438/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52439/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52448/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52454/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52456/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52462/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52463/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52467/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0641/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0646/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1151/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23850/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1151/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23850/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p207"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26595/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26597/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26598/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/5.10/0003.patch
|
||||
editKernelLocalversion "-dos.p233"
|
||||
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -196,16 +196,42 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51779/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52438/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52439/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52448/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52454/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52456/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52462/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52463/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52467/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0641/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0646/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1151/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23850/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1151/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23850/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p205"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26595/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26597/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26598/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/5.10/0003.patch
|
||||
editKernelLocalversion "-dos.p231"
|
||||
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -76,10 +76,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28554/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33070/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p79"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/^6.8/0001.patch
|
||||
editKernelLocalversion "-dos.p88"
|
||||
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -140,6 +140,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
@ -147,7 +152,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p147"
|
||||
editKernelLocalversion "-dos.p152"
|
||||
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -63,7 +63,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/^5.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2873/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3104/^5.18/0001.patch
|
||||
@ -212,12 +212,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51043/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52439/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52462/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p217"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p233"
|
||||
else echo "kernel_google_redbull is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -223,13 +223,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
editKernelLocalversion "-dos.p229"
|
||||
editKernelLocalversion "-dos.p232"
|
||||
else echo "kernel_google_wahoo is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -203,11 +203,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p207"
|
||||
editKernelLocalversion "-dos.p210"
|
||||
else echo "kernel_lge_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -206,11 +206,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p210"
|
||||
editKernelLocalversion "-dos.p213"
|
||||
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -135,6 +135,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
|
||||
@ -143,7 +148,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p143"
|
||||
editKernelLocalversion "-dos.p148"
|
||||
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -59,7 +59,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/^5.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -91,10 +91,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52439/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52462/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p94"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p111"
|
||||
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -79,6 +79,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25162/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.14/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.14/0005.patch
|
||||
@ -313,6 +314,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44733/4.14/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46906/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0004.patch
|
||||
@ -514,15 +516,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51042/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p522"
|
||||
editKernelLocalversion "-dos.p532"
|
||||
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -59,7 +59,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/^5.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -84,10 +84,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52462/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p87"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p95"
|
||||
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -40,10 +40,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35826/^6.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52462/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p43"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26581/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26595/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26598/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/5.4/0005.patch
|
||||
editKernelLocalversion "-dos.p54"
|
||||
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -203,11 +203,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p207"
|
||||
editKernelLocalversion "-dos.p210"
|
||||
else echo "kernel_razer_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -135,6 +135,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
|
||||
@ -143,7 +148,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p143"
|
||||
editKernelLocalversion "-dos.p148"
|
||||
else echo "kernel_razer_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -240,6 +240,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/4.9/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20934/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25045/4.9/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25160/4.9/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-ctnl-addr-leak/4.9/0006.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/4.14/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.9/0006.patch
|
||||
@ -464,6 +465,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43976/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.9/0005.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46906/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0009.patch
|
||||
@ -619,6 +621,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
|
||||
@ -627,7 +634,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.pat
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p627"
|
||||
editKernelLocalversion "-dos.p634"
|
||||
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -222,11 +222,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p226"
|
||||
editKernelLocalversion "-dos.p229"
|
||||
else echo "kernel_sony_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -287,6 +287,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46906/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.9/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0009.patch
|
||||
@ -460,6 +461,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
|
||||
@ -470,7 +476,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.pat
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
||||
editKernelLocalversion "-dos.p470"
|
||||
editKernelLocalversion "-dos.p476"
|
||||
else echo "kernel_sony_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -134,15 +134,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p142"
|
||||
editKernelLocalversion "-dos.p148"
|
||||
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -138,6 +138,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
|
||||
@ -146,7 +151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch
|
||||
editKernelLocalversion "-dos.p146"
|
||||
editKernelLocalversion "-dos.p151"
|
||||
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -85,10 +85,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p88"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/^6.8/0001.patch
|
||||
editKernelLocalversion "-dos.p97"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -64,7 +64,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/^5.3/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33630/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch
|
||||
@ -144,12 +144,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51043/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52439/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52449/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52462/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52469/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p149"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26606/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p165"
|
||||
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -84,10 +84,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-45863/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52464/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52470/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
editKernelLocalversion "-dos.p87"
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/^6.8/0001.patch
|
||||
editKernelLocalversion "-dos.p96"
|
||||
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -217,12 +217,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46343/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.4/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
editKernelLocalversion "-dos.p222"
|
||||
editKernelLocalversion "-dos.p225"
|
||||
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
Loading…
Reference in New Issue
Block a user