Update CVE patchers

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-10-18 10:27:45 -04:00
parent 2e83c91a81
commit 7ac51e9116
No known key found for this signature in database
GPG key ID: E599F62ECBAEAF2E
20 changed files with 71 additions and 53 deletions

View file

@ -212,6 +212,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30299/audio-kernel/0001.patch --direc
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30324/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.14/0002.patch

View file

@ -309,6 +309,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-3.0/0001.patch --directo
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30324/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30334/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.14/0002.patch

View file

@ -526,7 +526,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p527"
editKernelLocalversion "-dos.p526"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -526,7 +526,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p527"
editKernelLocalversion "-dos.p526"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -74,7 +74,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4129/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4379/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36402/5.10/0002.patch
@ -548,6 +548,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26907/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26921/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26926/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26931/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/5.10/0003.patch
@ -593,7 +594,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27047/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27051/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27052/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27072/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27072/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27073/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27075/5.10/0003.patch
@ -677,6 +678,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35955/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35958/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35960/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35965/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35966/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35967/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/5.10/0004.patch
@ -732,6 +734,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38544/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38546/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38547/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38548/5.10/0002.patch
@ -833,7 +836,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/5.10/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41022/5.10/0002.patch
@ -954,6 +957,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43905/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43907/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43908/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/5.1-^6.10/0001.patch
@ -990,6 +994,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46679/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46684/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46695/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46702/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46713/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46714/5.10/0002.patch
@ -1039,16 +1044,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46832/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46849/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46853/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46849/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46853/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47663/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47667/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47668/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47671/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47671/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-selinux-rwx/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
@ -1060,7 +1066,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p1060"
editKernelLocalversion "-dos.p1066"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -74,7 +74,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4129/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4379/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36402/5.10/0002.patch
@ -546,6 +546,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26900/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26901/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26907/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26920/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26921/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26926/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26931/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26934/5.10/0003.patch
@ -591,7 +592,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27047/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27051/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27052/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27072/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27072/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27073/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27075/5.10/0003.patch
@ -675,6 +676,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35955/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35958/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35960/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35965/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35966/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35967/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/5.10/0004.patch
@ -730,6 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38544/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38546/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38547/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38548/5.10/0002.patch
@ -831,7 +834,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41012/5.10/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41022/5.10/0002.patch
@ -952,6 +955,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43905/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43907/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43908/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44931/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/5.1-^6.10/0001.patch
@ -988,6 +992,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46679/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46684/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46695/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46702/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46713/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46714/5.10/0002.patch
@ -1037,16 +1042,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46832/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46849/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46853/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46849/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46853/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47663/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47667/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47668/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47671/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47671/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-selinux-rwx/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
@ -1058,7 +1064,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p1058"
editKernelLocalversion "-dos.p1064"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -68,6 +68,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch

View file

@ -753,7 +753,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p754"
editKernelLocalversion "-dos.p753"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -582,7 +582,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p583"
editKernelLocalversion "-dos.p582"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -283,6 +283,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30299/audio-kernel/0001.patch --direc
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30316/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30324/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.14/0002.patch

View file

@ -527,7 +527,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p528"
editKernelLocalversion "-dos.p527"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -650,7 +650,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
editKernelLocalversion "-dos.p651"
editKernelLocalversion "-dos.p650"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -69,6 +69,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch

View file

@ -408,7 +408,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p409"
editKernelLocalversion "-dos.p408"
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -67,6 +67,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch