mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
Update CVE patchers
Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
09b570fa5d
commit
b40a1f97d4
@ -68,7 +68,7 @@ external/caliper 4a0d9aba0856d0aa965d5653bfa4c138f0e8a8ba
|
|||||||
external/cblas d063db8bdddfcde61e4bad3bfe65941fd73e8094
|
external/cblas d063db8bdddfcde61e4bad3bfe65941fd73e8094
|
||||||
external/chromium-libpac 0ac78251d11006d764ba1aad8cc0867827fafe5c
|
external/chromium-libpac 0ac78251d11006d764ba1aad8cc0867827fafe5c
|
||||||
external/chromium-trace 8b2c0074e71a8086dee98ca8730acfdc5eddf7a1
|
external/chromium-trace 8b2c0074e71a8086dee98ca8730acfdc5eddf7a1
|
||||||
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994
|
external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
|
||||||
external/clang 751a76679b0fb5798ea6cab75906df07edcab315
|
external/clang 751a76679b0fb5798ea6cab75906df07edcab315
|
||||||
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
|
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
|
||||||
external/compiler-rt 0c46c9e892a3f68420635032ef2f6152dabd197c
|
external/compiler-rt 0c46c9e892a3f68420635032ef2f6152dabd197c
|
||||||
|
@ -67,7 +67,7 @@ external/capstone 6788a4139092f179005f7cdbf181ba24b60b6113
|
|||||||
external/cblas ddf5f49cb53866fbc503a6349bf44bac24a6963d
|
external/cblas ddf5f49cb53866fbc503a6349bf44bac24a6963d
|
||||||
external/chromium-libpac dff5ddb8d28f6ac9a86eb28763b4313f6f72eec5
|
external/chromium-libpac dff5ddb8d28f6ac9a86eb28763b4313f6f72eec5
|
||||||
external/chromium-trace b2cf025c7d5cebd43084f38c6c7ff9cc17da428a
|
external/chromium-trace b2cf025c7d5cebd43084f38c6c7ff9cc17da428a
|
||||||
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994
|
external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
|
||||||
external/clang f9d2af42fc6d74c28893af371e4647158eaba66c
|
external/clang f9d2af42fc6d74c28893af371e4647158eaba66c
|
||||||
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
|
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
|
||||||
external/cn-cbor 7fe9f01990a97be4df5e46d2decd894c06678072
|
external/cn-cbor 7fe9f01990a97be4df5e46d2decd894c06678072
|
||||||
|
@ -78,7 +78,7 @@ external/catch2 bcfbb791d09e390fb545c03ca002e570f764d960
|
|||||||
external/cblas 61ee00692011385347a5dd1ad872556899a5cf7a
|
external/cblas 61ee00692011385347a5dd1ad872556899a5cf7a
|
||||||
external/chromium-libpac c98fc96035e6fdc5b84d953d2bd38d2dcd175467
|
external/chromium-libpac c98fc96035e6fdc5b84d953d2bd38d2dcd175467
|
||||||
external/chromium-trace f4e722b911fcc6f7164026432de62a02ea3460fb
|
external/chromium-trace f4e722b911fcc6f7164026432de62a02ea3460fb
|
||||||
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994
|
external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
|
||||||
external/clang 8343f599c9e1dda8e6c1bb779af323a673a052f9
|
external/clang 8343f599c9e1dda8e6c1bb779af323a673a052f9
|
||||||
external/cldr 4e0bdd442c1e01f5c6147cf6032ce4f8587f4ede
|
external/cldr 4e0bdd442c1e01f5c6147cf6032ce4f8587f4ede
|
||||||
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
|
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
|
||||||
|
@ -135,7 +135,7 @@ external/cblas d82c5f4ae14b2a5468303985070f7dadc15d4094
|
|||||||
external/cbor-java f81e576298790c97498311e99a0b0b34653c3dd8
|
external/cbor-java f81e576298790c97498311e99a0b0b34653c3dd8
|
||||||
external/chromium-libpac 169c93e00a00605346a68d39d3f4713735bdb61e
|
external/chromium-libpac 169c93e00a00605346a68d39d3f4713735bdb61e
|
||||||
external/chromium-trace e524766cad26d677a9a1ec8c00c512d4cac2cf5e
|
external/chromium-trace e524766cad26d677a9a1ec8c00c512d4cac2cf5e
|
||||||
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994
|
external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
|
||||||
external/clang 0a1c53a5d295109bd4702ad13c0f2a5510ca1b26
|
external/clang 0a1c53a5d295109bd4702ad13c0f2a5510ca1b26
|
||||||
external/cldr 38850463abd624d5b2293be75fddc43cf6b55ae2
|
external/cldr 38850463abd624d5b2293be75fddc43cf6b55ae2
|
||||||
external/cn-cbor 696530332036f5518681d3c450cdbc3ee412004a
|
external/cn-cbor 696530332036f5518681d3c450cdbc3ee412004a
|
||||||
|
@ -94,7 +94,7 @@ external/catch2 2b2e0e9540defee10f28ea0fc97750490fa238b5
|
|||||||
external/cblas 2b24922070cb6d45edd5f5b533db0637099a2b17
|
external/cblas 2b24922070cb6d45edd5f5b533db0637099a2b17
|
||||||
external/cbor-java 00c4a382dd3810f9c1b363eaad339cff34a3f6fe
|
external/cbor-java 00c4a382dd3810f9c1b363eaad339cff34a3f6fe
|
||||||
external/chromium-trace 138ade68f9d3388a1b0a6d9ce5e091ff6f7e7448
|
external/chromium-trace 138ade68f9d3388a1b0a6d9ce5e091ff6f7e7448
|
||||||
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994
|
external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
|
||||||
external/clang f1cef8e77ae220c9379303bdc9896e0c2366bd6f
|
external/clang f1cef8e77ae220c9379303bdc9896e0c2366bd6f
|
||||||
external/cldr 242ecd0dcb21f3376f825119ec0b36fcb15e7bb8
|
external/cldr 242ecd0dcb21f3376f825119ec0b36fcb15e7bb8
|
||||||
external/cn-cbor 6a0f6a5375b8cd9b495e91c11d21ed257ec9a905
|
external/cn-cbor 6a0f6a5375b8cd9b495e91c11d21ed257ec9a905
|
||||||
|
@ -201,7 +201,7 @@ external/catch2 5f8628024c5a9219caa004d6a9547aacd9ba94c1
|
|||||||
external/cblas 4fdeda64177f60e1b226349885b3c0ea016f3068
|
external/cblas 4fdeda64177f60e1b226349885b3c0ea016f3068
|
||||||
external/cbor-java 6b4b6adc5ff8f91e2ddef14adf510e14aaf90204
|
external/cbor-java 6b4b6adc5ff8f91e2ddef14adf510e14aaf90204
|
||||||
external/chromium-trace 9456b95a6d4b95c765c9f2264a71b0334f6cf8d7
|
external/chromium-trace 9456b95a6d4b95c765c9f2264a71b0334f6cf8d7
|
||||||
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994
|
external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
|
||||||
external/clang 9fae335badf26813486d207b69928d38b979e522
|
external/clang 9fae335badf26813486d207b69928d38b979e522
|
||||||
external/cldr 7518f37169bd87d6977244e4d7471bc48fcd62e0
|
external/cldr 7518f37169bd87d6977244e4d7471bc48fcd62e0
|
||||||
external/cn-cbor 7b581886d1830f50c3ab104a56b7ab931779466f
|
external/cn-cbor 7b581886d1830f50c3ab104a56b7ab931779466f
|
||||||
|
@ -1 +1 @@
|
|||||||
Subproject commit 9936c5ee212b6731141d455b7e9f41de6459e883
|
Subproject commit 87c55be52883b283286903659828a5b969c49596
|
@ -826,6 +826,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
@ -960,7 +961,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p960"
|
editKernelLocalversion "-dos.p961"
|
||||||
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
|
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -491,6 +491,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
@ -620,7 +621,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p620"
|
editKernelLocalversion "-dos.p621"
|
||||||
else echo "kernel_asus_grouper is unavailable, not patching.";
|
else echo "kernel_asus_grouper is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -527,6 +527,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
@ -658,7 +659,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p658"
|
editKernelLocalversion "-dos.p659"
|
||||||
else echo "kernel_htc_msm8960 is unavailable, not patching.";
|
else echo "kernel_htc_msm8960 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -614,6 +614,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -793,7 +795,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p793"
|
editKernelLocalversion "-dos.p795"
|
||||||
else echo "kernel_htc_msm8994 is unavailable, not patching.";
|
else echo "kernel_htc_msm8994 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -701,6 +701,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -877,7 +879,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p877"
|
editKernelLocalversion "-dos.p879"
|
||||||
else echo "kernel_lge_msm8992 is unavailable, not patching.";
|
else echo "kernel_lge_msm8992 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -563,6 +563,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||||
@ -742,7 +744,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p742"
|
editKernelLocalversion "-dos.p744"
|
||||||
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
|
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -602,6 +602,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
@ -733,7 +734,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p733"
|
editKernelLocalversion "-dos.p734"
|
||||||
else echo "kernel_samsung_d2 is unavailable, not patching.";
|
else echo "kernel_samsung_d2 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -286,6 +286,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48804/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48804/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
@ -413,7 +414,7 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-sy
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p413"
|
editKernelLocalversion "-dos.p414"
|
||||||
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
|
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -405,6 +405,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
@ -534,7 +535,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p534"
|
editKernelLocalversion "-dos.p535"
|
||||||
else echo "kernel_samsung_manta is unavailable, not patching.";
|
else echo "kernel_samsung_manta is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -441,6 +441,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
@ -549,7 +550,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p549"
|
editKernelLocalversion "-dos.p550"
|
||||||
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
|
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -434,6 +434,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
@ -539,7 +540,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p539"
|
editKernelLocalversion "-dos.p540"
|
||||||
else echo "kernel_samsung_tuna is unavailable, not patching.";
|
else echo "kernel_samsung_tuna is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -858,6 +858,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48851/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||||
@ -935,7 +939,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.4/0001.patch
|
||||||
@ -1084,7 +1087,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p1084"
|
editKernelLocalversion "-dos.p1087"
|
||||||
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
|
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -708,6 +708,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||||
@ -889,7 +890,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p889"
|
editKernelLocalversion "-dos.p890"
|
||||||
else echo "kernel_asus_fugu is unavailable, not patching.";
|
else echo "kernel_asus_fugu is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -511,6 +511,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
@ -692,7 +694,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p692"
|
editKernelLocalversion "-dos.p694"
|
||||||
else echo "kernel_asus_msm8916 is unavailable, not patching.";
|
else echo "kernel_asus_msm8916 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -820,6 +820,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48851/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||||
@ -901,7 +906,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.4/0008.patch
|
||||||
@ -1053,7 +1057,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p1053"
|
editKernelLocalversion "-dos.p1057"
|
||||||
else echo "kernel_google_dragon is unavailable, not patching.";
|
else echo "kernel_google_dragon is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -506,6 +506,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -686,7 +688,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p686"
|
editKernelLocalversion "-dos.p688"
|
||||||
else echo "kernel_htc_flounder is unavailable, not patching.";
|
else echo "kernel_htc_flounder is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -633,6 +633,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -813,7 +815,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p813"
|
editKernelLocalversion "-dos.p815"
|
||||||
else echo "kernel_huawei_angler is unavailable, not patching.";
|
else echo "kernel_huawei_angler is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -644,6 +644,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -824,7 +826,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p824"
|
editKernelLocalversion "-dos.p826"
|
||||||
else echo "kernel_lge_bullhead is unavailable, not patching.";
|
else echo "kernel_lge_bullhead is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -807,6 +807,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||||
@ -892,7 +896,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||||
@ -1044,7 +1047,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p1044"
|
editKernelLocalversion "-dos.p1047"
|
||||||
else echo "kernel_zte_msm8996 is unavailable, not patching.";
|
else echo "kernel_zte_msm8996 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -508,6 +508,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
@ -690,7 +692,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p690"
|
editKernelLocalversion "-dos.p692"
|
||||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -453,6 +453,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
|
||||||
@ -585,7 +586,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p585"
|
editKernelLocalversion "-dos.p586"
|
||||||
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
|
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -557,6 +557,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||||
@ -735,7 +737,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p735"
|
editKernelLocalversion "-dos.p737"
|
||||||
else echo "kernel_google_yellowstone is unavailable, not patching.";
|
else echo "kernel_google_yellowstone is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -362,6 +362,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
@ -543,7 +545,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p543"
|
editKernelLocalversion "-dos.p545"
|
||||||
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
|
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -508,6 +508,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
@ -690,7 +692,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p690"
|
editKernelLocalversion "-dos.p692"
|
||||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -559,6 +559,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -734,7 +735,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p734"
|
editKernelLocalversion "-dos.p735"
|
||||||
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
|
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -478,6 +478,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -657,7 +659,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p657"
|
editKernelLocalversion "-dos.p659"
|
||||||
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
|
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -480,6 +480,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -659,7 +661,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p659"
|
editKernelLocalversion "-dos.p661"
|
||||||
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
|
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -613,6 +613,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.14/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.14/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48912/4.14/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48924/4.14/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||||
@ -1049,6 +1060,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
||||||
@ -1056,7 +1068,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p1056"
|
editKernelLocalversion "-dos.p1068"
|
||||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -564,6 +564,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -686,7 +694,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||||
@ -885,7 +892,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p885"
|
editKernelLocalversion "-dos.p892"
|
||||||
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
|
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -275,6 +275,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||||
@ -395,7 +396,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p395"
|
editKernelLocalversion "-dos.p396"
|
||||||
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
|
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -621,6 +621,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48851/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||||
@ -705,7 +709,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
||||||
@ -860,7 +863,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p860"
|
editKernelLocalversion "-dos.p863"
|
||||||
else echo "kernel_google_marlin is unavailable, not patching.";
|
else echo "kernel_google_marlin is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -448,6 +448,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
@ -579,7 +580,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p579"
|
editKernelLocalversion "-dos.p580"
|
||||||
else echo "kernel_google_msm is unavailable, not patching.";
|
else echo "kernel_google_msm is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -554,6 +554,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
|
||||||
@ -689,7 +690,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p689"
|
editKernelLocalversion "-dos.p690"
|
||||||
else echo "kernel_htc_msm8974 is unavailable, not patching.";
|
else echo "kernel_htc_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -482,6 +482,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
@ -613,7 +614,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p613"
|
editKernelLocalversion "-dos.p614"
|
||||||
else echo "kernel_lge_g3 is unavailable, not patching.";
|
else echo "kernel_lge_g3 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -421,6 +421,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
@ -551,7 +552,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p551"
|
editKernelLocalversion "-dos.p552"
|
||||||
else echo "kernel_lge_hammerhead is unavailable, not patching.";
|
else echo "kernel_lge_hammerhead is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -75,6 +75,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/^6.3/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/^6.3/0002.patch
|
||||||
@ -189,7 +190,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p189"
|
editKernelLocalversion "-dos.p190"
|
||||||
else echo "kernel_lge_mako is unavailable, not patching.";
|
else echo "kernel_lge_mako is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -467,6 +467,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
|
||||||
@ -597,7 +598,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p597"
|
editKernelLocalversion "-dos.p598"
|
||||||
else echo "kernel_lge_msm8974 is unavailable, not patching.";
|
else echo "kernel_lge_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -394,6 +394,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -581,7 +583,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p581"
|
editKernelLocalversion "-dos.p583"
|
||||||
else echo "kernel_moto_shamu is unavailable, not patching.";
|
else echo "kernel_moto_shamu is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -535,6 +535,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
@ -668,7 +669,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p668"
|
editKernelLocalversion "-dos.p669"
|
||||||
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
|
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -638,6 +638,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||||
@ -724,7 +728,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
||||||
@ -879,7 +882,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p879"
|
editKernelLocalversion "-dos.p882"
|
||||||
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
|
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -531,6 +531,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
@ -709,7 +711,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p709"
|
editKernelLocalversion "-dos.p711"
|
||||||
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
|
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -626,6 +626,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||||
@ -712,7 +716,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
|
||||||
@ -867,7 +870,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p867"
|
editKernelLocalversion "-dos.p870"
|
||||||
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
|
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -410,6 +410,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
@ -538,7 +539,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p538"
|
editKernelLocalversion "-dos.p539"
|
||||||
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
|
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -485,6 +485,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
@ -617,7 +618,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p617"
|
editKernelLocalversion "-dos.p618"
|
||||||
else echo "kernel_samsung_jf is unavailable, not patching.";
|
else echo "kernel_samsung_jf is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -567,6 +567,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
|
||||||
@ -701,7 +702,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p701"
|
editKernelLocalversion "-dos.p702"
|
||||||
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
|
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -296,6 +296,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
|
||||||
@ -423,7 +424,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p423"
|
editKernelLocalversion "-dos.p424"
|
||||||
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
|
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -194,6 +194,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||||
@ -319,7 +327,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||||
@ -527,7 +534,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p527"
|
editKernelLocalversion "-dos.p534"
|
||||||
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -693,6 +693,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.14/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.14/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48912/4.14/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48924/4.14/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||||
@ -1128,6 +1139,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||||
@ -1138,7 +1151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p1138"
|
editKernelLocalversion "-dos.p1151"
|
||||||
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -231,6 +231,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -351,7 +359,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.4/0008.patch
|
||||||
@ -555,7 +562,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p555"
|
editKernelLocalversion "-dos.p562"
|
||||||
else echo "kernel_essential_msm8998 is unavailable, not patching.";
|
else echo "kernel_essential_msm8998 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -100,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||||
@ -436,6 +437,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||||
@ -445,7 +447,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p445"
|
editKernelLocalversion "-dos.p447"
|
||||||
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
|
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -98,6 +98,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
|
||||||
@ -440,13 +443,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p446"
|
editKernelLocalversion "-dos.p451"
|
||||||
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
|
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -180,6 +180,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -296,7 +304,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||||
@ -505,7 +512,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p505"
|
editKernelLocalversion "-dos.p512"
|
||||||
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
|
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -98,6 +98,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
|
||||||
@ -440,13 +443,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p446"
|
editKernelLocalversion "-dos.p451"
|
||||||
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
|
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -95,14 +95,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48828/5.10/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48871/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48871/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48872/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48872/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48873/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48873/5.10/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48875/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/5.10/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/5.10/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48878/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48878/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/5.10/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/5.10/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/5.10/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48893/^5.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48894/^6.2/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48894/^6.2/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
|
||||||
@ -924,6 +927,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43849/5.10/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.10/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43867/5.10/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.10/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.10/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.10/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
|
||||||
@ -933,7 +940,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
|
||||||
editKernelLocalversion "-dos.p933"
|
editKernelLocalversion "-dos.p940"
|
||||||
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
|
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -95,14 +95,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48828/5.10/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48871/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48871/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48872/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48872/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48873/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48873/5.10/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48875/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/5.10/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/5.10/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48878/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48878/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/5.10/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/5.10/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/5.10/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48893/^5.18/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48894/^6.2/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48894/^6.2/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
|
||||||
@ -922,6 +925,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43849/5.10/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.10/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43867/5.10/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.10/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.10/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.10/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
|
||||||
@ -931,7 +938,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
|
||||||
editKernelLocalversion "-dos.p931"
|
editKernelLocalversion "-dos.p938"
|
||||||
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
|
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -95,6 +95,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48671/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
|
||||||
@ -437,12 +439,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p442"
|
editKernelLocalversion "-dos.p446"
|
||||||
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
|
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -105,6 +105,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||||
@ -435,6 +436,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||||
@ -444,7 +446,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p444"
|
editKernelLocalversion "-dos.p446"
|
||||||
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
|
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -134,6 +134,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.19/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.19/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.19/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.19/0004.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||||
@ -653,13 +654,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p659"
|
editKernelLocalversion "-dos.p662"
|
||||||
else echo "kernel_google_redbull is unavailable, not patching.";
|
else echo "kernel_google_redbull is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -195,6 +195,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -316,7 +324,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.4/0008.patch
|
||||||
@ -524,7 +531,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p524"
|
editKernelLocalversion "-dos.p531"
|
||||||
else echo "kernel_google_wahoo is unavailable, not patching.";
|
else echo "kernel_google_wahoo is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -180,6 +180,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -296,7 +304,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||||
@ -505,7 +512,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p505"
|
editKernelLocalversion "-dos.p512"
|
||||||
else echo "kernel_lge_msm8996 is unavailable, not patching.";
|
else echo "kernel_lge_msm8996 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -181,6 +181,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||||
@ -299,7 +307,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||||
@ -509,7 +516,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p509"
|
editKernelLocalversion "-dos.p516"
|
||||||
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
|
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -100,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||||
@ -442,6 +443,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||||
@ -451,7 +453,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p451"
|
editKernelLocalversion "-dos.p453"
|
||||||
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
|
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -95,6 +95,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48797/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48797/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
|
||||||
@ -492,13 +495,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p498"
|
editKernelLocalversion "-dos.p503"
|
||||||
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
|
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -660,6 +660,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.14/0003.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.14/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48912/4.14/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48924/4.14/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||||
@ -1094,6 +1104,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||||
@ -1103,7 +1115,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p1103"
|
editKernelLocalversion "-dos.p1115"
|
||||||
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
|
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -96,6 +96,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
|
||||||
@ -438,13 +441,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p444"
|
editKernelLocalversion "-dos.p449"
|
||||||
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
|
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -58,6 +58,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48812/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48812/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.4/0004.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.4/0004.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||||
@ -536,6 +537,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43846/5.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.4/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43867/5.4/0004.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.4/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.4/0004.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.4/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
|
||||||
@ -546,7 +551,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
|
||||||
editKernelLocalversion "-dos.p546"
|
editKernelLocalversion "-dos.p551"
|
||||||
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
|
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -180,6 +180,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -296,7 +304,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||||
@ -505,7 +512,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p505"
|
editKernelLocalversion "-dos.p512"
|
||||||
else echo "kernel_razer_msm8998 is unavailable, not patching.";
|
else echo "kernel_razer_msm8998 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -100,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||||
@ -438,6 +439,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||||
@ -447,7 +449,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p447"
|
editKernelLocalversion "-dos.p449"
|
||||||
else echo "kernel_razer_sdm845 is unavailable, not patching.";
|
else echo "kernel_razer_sdm845 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -736,6 +736,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.9/0005.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.9/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||||
@ -1047,6 +1055,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||||
@ -1055,7 +1064,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p1055"
|
editKernelLocalversion "-dos.p1064"
|
||||||
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
|
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -191,6 +191,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -315,7 +323,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||||
@ -520,7 +527,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p520"
|
editKernelLocalversion "-dos.p527"
|
||||||
else echo "kernel_sony_sdm660 is unavailable, not patching.";
|
else echo "kernel_sony_sdm660 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -579,6 +579,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.9/0005.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.9/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.9/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.9/0005.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||||
@ -914,6 +923,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||||
@ -925,7 +935,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p925"
|
editKernelLocalversion "-dos.p935"
|
||||||
else echo "kernel_sony_sdm845 is unavailable, not patching.";
|
else echo "kernel_sony_sdm845 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -96,6 +96,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||||
@ -435,6 +436,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||||
@ -444,7 +446,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p444"
|
editKernelLocalversion "-dos.p446"
|
||||||
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
|
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -102,6 +102,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||||
@ -445,6 +446,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||||
@ -454,7 +456,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p454"
|
editKernelLocalversion "-dos.p456"
|
||||||
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -103,6 +103,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48671/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
|
||||||
@ -474,12 +476,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p479"
|
editKernelLocalversion "-dos.p483"
|
||||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -98,6 +98,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48674/^6.0/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
|
||||||
@ -322,10 +325,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p325"
|
editKernelLocalversion "-dos.p330"
|
||||||
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -101,6 +101,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48671/4.19/0002.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
|
||||||
@ -476,12 +478,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||||
editKernelLocalversion "-dos.p481"
|
editKernelLocalversion "-dos.p485"
|
||||||
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
|
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
@ -190,6 +190,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||||
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||||
@ -310,7 +318,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
|
||||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
|
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
|
||||||
@ -521,7 +528,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directo
|
|||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||||
editKernelLocalversion "-dos.p521"
|
editKernelLocalversion "-dos.p528"
|
||||||
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
|
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
|
||||||
fi;
|
fi;
|
||||||
cd "$DOS_BUILD_BASE"
|
cd "$DOS_BUILD_BASE"
|
||||||
|
Loading…
Reference in New Issue
Block a user