mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-08-24 22:09:23 -04:00
Update CVE patchers
Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
c7c759afd4
commit
a7ce9de6e8
36 changed files with 69 additions and 36 deletions
|
@ -251,6 +251,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-20022/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.13/0001.patch
|
||||
|
@ -841,7 +842,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p841"
|
||||
editKernelLocalversion "-dos.p842"
|
||||
else echo "kernel_asus_fugu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -184,6 +184,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.18/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-20022/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/^4.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/^4.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/^4.10/0008.patch
|
||||
|
@ -989,7 +990,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p989"
|
||||
editKernelLocalversion "-dos.p990"
|
||||
else echo "kernel_google_dragon is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -82,6 +82,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-20022/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.13/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.14/0006.patch
|
||||
|
@ -638,7 +639,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p638"
|
||||
editKernelLocalversion "-dos.p639"
|
||||
else echo "kernel_htc_flounder is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -175,6 +175,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-20022/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.13/0001.patch
|
||||
|
@ -765,7 +766,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p765"
|
||||
editKernelLocalversion "-dos.p766"
|
||||
else echo "kernel_huawei_angler is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -168,6 +168,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10235/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-20022/3.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/^4.13/0001.patch
|
||||
|
@ -776,7 +777,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p776"
|
||||
editKernelLocalversion "-dos.p777"
|
||||
else echo "kernel_lge_bullhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -82,6 +82,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-20022/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/^4.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/^4.10/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/^4.10/0009.patch
|
||||
|
@ -976,7 +977,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p976"
|
||||
editKernelLocalversion "-dos.p977"
|
||||
else echo "kernel_zte_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue