mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-05-02 22:45:11 -04:00
Update CVE patchers
Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
1636f68138
commit
8383cd716d
82 changed files with 186 additions and 88 deletions
|
@ -900,6 +900,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
|
||||
|
@ -912,7 +913,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p912"
|
||||
editKernelLocalversion "-dos.p913"
|
||||
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -563,6 +563,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -571,7 +572,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p571"
|
||||
editKernelLocalversion "-dos.p572"
|
||||
else echo "kernel_asus_grouper is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -600,6 +600,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
|
@ -609,7 +610,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p609"
|
||||
editKernelLocalversion "-dos.p610"
|
||||
else echo "kernel_htc_msm8960 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -715,6 +715,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
|
@ -727,7 +728,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p727"
|
||||
editKernelLocalversion "-dos.p728"
|
||||
else echo "kernel_htc_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -801,6 +801,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
|
@ -812,7 +813,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p812"
|
||||
editKernelLocalversion "-dos.p813"
|
||||
else echo "kernel_lge_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -667,6 +667,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -676,7 +677,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p676"
|
||||
editKernelLocalversion "-dos.p677"
|
||||
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -675,6 +675,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
|
@ -684,7 +685,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p684"
|
||||
editKernelLocalversion "-dos.p685"
|
||||
else echo "kernel_samsung_d2 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -358,11 +358,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p362"
|
||||
editKernelLocalversion "-dos.p363"
|
||||
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -478,6 +478,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -485,7 +486,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p485"
|
||||
editKernelLocalversion "-dos.p486"
|
||||
else echo "kernel_samsung_manta is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -982,6 +982,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
|
@ -993,7 +994,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p993"
|
||||
editKernelLocalversion "-dos.p994"
|
||||
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -806,6 +806,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
|
||||
|
@ -824,7 +825,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p824"
|
||||
editKernelLocalversion "-dos.p825"
|
||||
else echo "kernel_asus_fugu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -615,6 +615,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -625,7 +626,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p625"
|
||||
editKernelLocalversion "-dos.p626"
|
||||
else echo "kernel_asus_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -946,6 +946,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
|
@ -959,7 +960,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p959"
|
||||
editKernelLocalversion "-dos.p960"
|
||||
else echo "kernel_google_dragon is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -609,6 +609,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
|
@ -620,7 +621,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p620"
|
||||
editKernelLocalversion "-dos.p621"
|
||||
else echo "kernel_htc_flounder is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -735,6 +735,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
|
@ -747,7 +748,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p747"
|
||||
editKernelLocalversion "-dos.p748"
|
||||
else echo "kernel_huawei_angler is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -746,6 +746,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
|
@ -758,7 +759,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p758"
|
||||
editKernelLocalversion "-dos.p759"
|
||||
else echo "kernel_lge_bullhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -939,6 +939,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
|
@ -949,7 +950,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p949"
|
||||
editKernelLocalversion "-dos.p950"
|
||||
else echo "kernel_zte_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -613,6 +613,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -623,7 +624,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p623"
|
||||
editKernelLocalversion "-dos.p624"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -530,6 +530,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -537,7 +538,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p537"
|
||||
editKernelLocalversion "-dos.p538"
|
||||
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -660,6 +660,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -670,7 +671,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p670"
|
||||
editKernelLocalversion "-dos.p671"
|
||||
else echo "kernel_google_yellowstone is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -464,6 +464,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
|
@ -476,7 +477,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p476"
|
||||
editKernelLocalversion "-dos.p477"
|
||||
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -613,6 +613,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -623,7 +624,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p623"
|
||||
editKernelLocalversion "-dos.p624"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -660,6 +660,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
|
@ -669,7 +670,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p669"
|
||||
editKernelLocalversion "-dos.p670"
|
||||
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -581,6 +581,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -590,7 +591,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p590"
|
||||
editKernelLocalversion "-dos.p591"
|
||||
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -583,6 +583,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -592,7 +593,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p592"
|
||||
editKernelLocalversion "-dos.p593"
|
||||
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -853,13 +853,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p859"
|
||||
editKernelLocalversion "-dos.p861"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -752,6 +752,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
|
@ -760,7 +761,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p760"
|
||||
editKernelLocalversion "-dos.p761"
|
||||
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -344,10 +344,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p347"
|
||||
editKernelLocalversion "-dos.p348"
|
||||
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -757,6 +757,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
|
@ -769,7 +770,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p769"
|
||||
editKernelLocalversion "-dos.p770"
|
||||
else echo "kernel_google_marlin is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -521,6 +521,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
|
||||
|
@ -531,7 +532,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p531"
|
||||
editKernelLocalversion "-dos.p532"
|
||||
else echo "kernel_google_msm is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -631,6 +631,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
||||
|
@ -641,7 +642,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p641"
|
||||
editKernelLocalversion "-dos.p642"
|
||||
else echo "kernel_htc_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -558,6 +558,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -565,7 +566,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p565"
|
||||
editKernelLocalversion "-dos.p566"
|
||||
else echo "kernel_lge_g3 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -495,6 +495,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -503,7 +504,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p503"
|
||||
editKernelLocalversion "-dos.p504"
|
||||
else echo "kernel_lge_hammerhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -138,10 +138,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p141"
|
||||
editKernelLocalversion "-dos.p142"
|
||||
else echo "kernel_lge_mako is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -543,13 +543,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p549"
|
||||
editKernelLocalversion "-dos.p550"
|
||||
else echo "kernel_lge_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -499,6 +499,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
|
@ -512,7 +513,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p512"
|
||||
editKernelLocalversion "-dos.p513"
|
||||
else echo "kernel_moto_shamu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -612,6 +612,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -620,7 +621,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p620"
|
||||
editKernelLocalversion "-dos.p621"
|
||||
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -774,6 +774,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
|
@ -783,7 +784,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p783"
|
||||
editKernelLocalversion "-dos.p784"
|
||||
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -633,6 +633,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -642,7 +643,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p642"
|
||||
editKernelLocalversion "-dos.p643"
|
||||
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -762,6 +762,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
|
@ -771,7 +772,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p771"
|
||||
editKernelLocalversion "-dos.p772"
|
||||
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -486,11 +486,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p490"
|
||||
editKernelLocalversion "-dos.p491"
|
||||
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -559,6 +559,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
|
@ -569,7 +570,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p569"
|
||||
editKernelLocalversion "-dos.p570"
|
||||
else echo "kernel_samsung_jf is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -641,6 +641,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
||||
|
@ -653,7 +654,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p653"
|
||||
editKernelLocalversion "-dos.p654"
|
||||
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -372,10 +372,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p375"
|
||||
editKernelLocalversion "-dos.p376"
|
||||
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -398,11 +398,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p402"
|
||||
editKernelLocalversion "-dos.p403"
|
||||
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -933,6 +933,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
|
@ -942,7 +944,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p942"
|
||||
editKernelLocalversion "-dos.p944"
|
||||
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -426,6 +426,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
|
@ -433,7 +434,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p433"
|
||||
editKernelLocalversion "-dos.p434"
|
||||
else echo "kernel_essential_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -306,6 +306,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -314,7 +316,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p314"
|
||||
editKernelLocalversion "-dos.p316"
|
||||
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -289,12 +289,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p294"
|
||||
editKernelLocalversion "-dos.p296"
|
||||
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -374,11 +374,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p378"
|
||||
editKernelLocalversion "-dos.p379"
|
||||
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -289,12 +289,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p294"
|
||||
editKernelLocalversion "-dos.p296"
|
||||
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -667,6 +667,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/5.10/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36957/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
|
||||
|
@ -675,7 +677,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||
editKernelLocalversion "-dos.p675"
|
||||
editKernelLocalversion "-dos.p677"
|
||||
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -665,6 +665,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/5.10/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36957/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
|
||||
|
@ -673,7 +675,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||
editKernelLocalversion "-dos.p673"
|
||||
editKernelLocalversion "-dos.p675"
|
||||
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -276,11 +276,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p280"
|
||||
editKernelLocalversion "-dos.p282"
|
||||
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -309,6 +309,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -317,7 +319,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p317"
|
||||
editKernelLocalversion "-dos.p319"
|
||||
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -493,12 +493,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p498"
|
||||
editKernelLocalversion "-dos.p500"
|
||||
else echo "kernel_google_redbull is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -391,6 +391,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
|
@ -398,7 +399,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p398"
|
||||
editKernelLocalversion "-dos.p399"
|
||||
else echo "kernel_google_wahoo is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -374,11 +374,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p378"
|
||||
editKernelLocalversion "-dos.p379"
|
||||
else echo "kernel_lge_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -378,11 +378,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p382"
|
||||
editKernelLocalversion "-dos.p383"
|
||||
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -310,6 +310,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -318,7 +320,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p318"
|
||||
editKernelLocalversion "-dos.p320"
|
||||
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -340,12 +340,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p345"
|
||||
editKernelLocalversion "-dos.p347"
|
||||
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -900,6 +900,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
|
@ -908,7 +910,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p908"
|
||||
editKernelLocalversion "-dos.p910"
|
||||
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -287,12 +287,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p292"
|
||||
editKernelLocalversion "-dos.p294"
|
||||
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -331,6 +331,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/5.4/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.4/0005.patch
|
||||
|
@ -339,7 +341,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
|
||||
editKernelLocalversion "-dos.p339"
|
||||
editKernelLocalversion "-dos.p341"
|
||||
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -374,11 +374,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p378"
|
||||
editKernelLocalversion "-dos.p379"
|
||||
else echo "kernel_razer_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -309,6 +309,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -317,7 +319,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p317"
|
||||
editKernelLocalversion "-dos.p319"
|
||||
else echo "kernel_razer_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -906,6 +906,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||
|
@ -913,7 +915,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p913"
|
||||
editKernelLocalversion "-dos.p915"
|
||||
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -391,11 +391,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p395"
|
||||
editKernelLocalversion "-dos.p396"
|
||||
else echo "kernel_sony_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -763,6 +763,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -773,7 +775,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p773"
|
||||
editKernelLocalversion "-dos.p775"
|
||||
else echo "kernel_sony_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -306,6 +306,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -314,7 +316,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p314"
|
||||
editKernelLocalversion "-dos.p316"
|
||||
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -313,6 +313,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -321,7 +323,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p321"
|
||||
editKernelLocalversion "-dos.p323"
|
||||
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -310,11 +310,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p314"
|
||||
editKernelLocalversion "-dos.p316"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -172,8 +172,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
editKernelLocalversion "-dos.p173"
|
||||
editKernelLocalversion "-dos.p175"
|
||||
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -312,11 +312,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p316"
|
||||
editKernelLocalversion "-dos.p318"
|
||||
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -389,12 +389,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p394"
|
||||
editKernelLocalversion "-dos.p395"
|
||||
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue