Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-05-13 19:00:38 -04:00
parent 89ab1d69ef
commit 674c84855d
No known key found for this signature in database
GPG key ID: E599F62ECBAEAF2E
12 changed files with 19 additions and 35 deletions

View file

@ -85,7 +85,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48639/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
@ -175,7 +174,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26851/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26852/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26917/4.19/0003.patch
@ -209,7 +207,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27396/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
editKernelLocalversion "-dos.p209"
editKernelLocalversion "-dos.p207"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -85,7 +85,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48639/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
@ -175,7 +174,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26851/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26852/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26917/4.19/0003.patch
@ -209,7 +207,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27396/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
editKernelLocalversion "-dos.p209"
editKernelLocalversion "-dos.p207"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -398,7 +398,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26874/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26875/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26877/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/5.10/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26882/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26883/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26884/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/5.10/0004.patch
@ -469,7 +468,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27437/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26750/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
editKernelLocalversion "-dos.p469"
editKernelLocalversion "-dos.p468"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -396,7 +396,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26874/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26875/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26877/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/5.10/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26882/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26883/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26884/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/5.10/0004.patch
@ -467,7 +466,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27437/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26750/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
editKernelLocalversion "-dos.p467"
editKernelLocalversion "-dos.p466"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -114,7 +114,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48639/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48671/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
@ -327,7 +326,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26851/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26852/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26859/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26874/4.19/0002.patch
@ -376,7 +374,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27396/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
editKernelLocalversion "-dos.p376"
editKernelLocalversion "-dos.p374"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -81,7 +81,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48639/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
@ -196,7 +195,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26851/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26852/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26859/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26874/4.19/0002.patch
@ -247,7 +245,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27396/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
editKernelLocalversion "-dos.p247"
editKernelLocalversion "-dos.p245"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -83,7 +83,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48639/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
@ -173,7 +172,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26851/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26852/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26917/4.19/0003.patch
@ -207,7 +205,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27396/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
editKernelLocalversion "-dos.p207"
editKernelLocalversion "-dos.p205"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -155,7 +155,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26851/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26852/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26855/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26857/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26859/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26862/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26863/5.4/0005.patch
@ -163,7 +162,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26874/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26875/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26878/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26880/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26882/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26883/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26884/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26889/5.4/0006.patch
@ -224,7 +222,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27437/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26750/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.4/0006.patch
editKernelLocalversion "-dos.p224"
editKernelLocalversion "-dos.p222"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -85,7 +85,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48639/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48674/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
@ -176,7 +175,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26840/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26845/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26851/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26852/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26857/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26917/4.19/0003.patch
@ -210,7 +208,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27396/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
editKernelLocalversion "-dos.p210"
editKernelLocalversion "-dos.p208"
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"