Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-10-12 13:03:20 -04:00
parent b060b68316
commit bc14aa5d0e
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
19 changed files with 7 additions and 20 deletions

@ -1 +1 @@
Subproject commit e3cb0f68d8774b58b805aae257cd512fcb72a6e6
Subproject commit 63e4df0bbb2b0eb66e89c8052700316c15e66e18

View File

@ -59,7 +59,7 @@ commentPatches android_kernel_google_gs101_private_gs-google.sh "CVE-2021-29648/
commentPatches android_kernel_google_gs201_private_gs-google.sh "CVE-2021-29648/^5.11/0001.patch" "CVE-2023-6817/5.10/0002.patch" "CVE-2023-52462/5.10/0002.patch" "CVE-2023-52672" "CVE-2024-26733/5.10/0002.patch" "CVE-2023-52656/5.10" "CVE-2024-26882" "CVE-2024-38564" "CVE-2022-48862" "CVE-2024-46681" "CVE-2024-46826";
commentPatches android_kernel_google_marlin.sh "0001-LinuxIncrementals/3.18/3.18.0098-0099.patch" "0006-AndroidHardening-Kernel_Hardening/3.18/0048.patch" "0006-AndroidHardening-Kernel_Hardening/3.18/0049.patch" "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2017-13162/3.18/0001.patch" "CVE-2017-14883" "CVE-2017-15951" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-42896/4.9";
commentPatches android_kernel_google_msm.sh "CVE-2017-11015/prima" "CVE-2021-Misc2/ANY/0031.patch";
commentPatches android_kernel_google_msm-4.9.sh "CVE-2019-19319" "CVE-2020-0067" "CVE-2020-1749" "CVE-2020-8992" "CVE-2021-30324" "CVE-2021-45469";
commentPatches android_kernel_google_msm-4.9.sh "CVE-2019-19319" "CVE-2020-0067" "CVE-2020-1749" "CVE-2020-8992" "CVE-2021-30324" "CVE-2021-45469" "CVE-2021-30319";
commentPatches android_kernel_google_redbull.sh "CVE-2018-5873" "CVE-2021-3444" "CVE-2021-3600";
commentPatches android_kernel_google_sunfish.sh "CVE-2021-30324";
commentPatches android_kernel_google_wahoo.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-14047/ANY/0002.patch" "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166" "CVE-2021-30324";
@ -98,7 +98,7 @@ commentPatches android_kernel_samsung_tuna.sh "CVE-2012-2127";
commentPatches android_kernel_samsung_universal8890.sh "0008-Graphene-Kernel_Hardening-ro" "CVE-2016-7917" "CVE-2018-1092" "CVE-2018-17972" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2022-42896/4.9";
commentPatches android_kernel_samsung_exynos9810.sh "CVE-2020-1749" "CVE-2019-ctnl-addr-leak" "CVE-2019-18282" "CVE-2019-11599" "CVE-2022-20566" "CVE-2019-16746" "CVE-2021-45469" "CVE-2020-0305" "CVE-2021-3506/4.19" "CVE-2024-26934/4.19" "CVE-2024-26934" "CVE-2024-44944";
commentPatches android_kernel_samsung_universal9810.sh "CVE-2020-1749";
commentPatches android_kernel_sony_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166";
commentPatches android_kernel_sony_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166" "CVE-2021-30319";
commentPatches android_kernel_sony_sdm845.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992";
commentPatches android_kernel_xiaomi_msm8937.sh "CVE-2017-13162" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-25715";
commentPatches android_kernel_xiaomi_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch";

View File

@ -1115,7 +1115,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch

View File

@ -1197,7 +1197,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch

View File

@ -485,7 +485,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch

View File

@ -485,7 +485,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch

View File

@ -980,7 +980,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45019/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45026/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45028/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/5.10-^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46676/5.10/0002.patch

View File

@ -978,7 +978,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45019/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45026/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45028/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/5.10-^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46676/5.10/0002.patch

View File

@ -475,7 +475,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch

View File

@ -69,7 +69,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch

View File

@ -711,7 +711,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch

View File

@ -541,7 +541,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch

View File

@ -1152,7 +1152,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch

View File

@ -486,7 +486,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch

View File

@ -587,7 +587,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45016/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45026/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45028/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/5.4/0005.patch

View File

@ -62,7 +62,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3542/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4034/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch

View File

@ -511,7 +511,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch

View File

@ -369,7 +369,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch

View File

@ -515,7 +515,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch