Update CVE patchers

Likely some breakage

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-08-07 12:25:22 -04:00
parent 9abdaa0d51
commit 4d5d69cf34
No known key found for this signature in database
GPG key ID: E599F62ECBAEAF2E
70 changed files with 1691 additions and 756 deletions

View file

@ -767,6 +767,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36484/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch
@ -774,6 +775,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
@ -784,7 +786,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38621/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38633/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38634/4.4/0008.patch
@ -792,31 +794,47 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38659/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39292/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39469/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40942/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40932/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40942/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40943/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40974/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
@ -829,7 +847,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p829"
editKernelLocalversion "-dos.p847"
else echo "kernel_google_marlin is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"