mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
Update CVE patchers
This commit is contained in:
parent
12283124b5
commit
c13672b9b7
@ -1 +1 @@
|
||||
Subproject commit 927eaf56c786ecaf866b9e4171bea72147e9bf02
|
||||
Subproject commit 17e09ccb9b91c7466ff09f99fa5c8c8bc7a73e56
|
@ -118,7 +118,7 @@ generateBootAnimationMask() {
|
||||
local font=$2
|
||||
local output=$3;
|
||||
convert -background black -fill transparent -font "$font" -gravity center -size 512x128 label:"$text" "$output";
|
||||
optipng "$output";
|
||||
#optipng "$output"; #XXX: breaks boot animation on 14.1?
|
||||
}
|
||||
export -f generateBootAnimationMask;
|
||||
|
||||
@ -128,7 +128,7 @@ generateBootAnimationShine() {
|
||||
local output=$3;
|
||||
#The colors need to be symmetrical in order to make the animation smooth and not have any noticble lines
|
||||
convert -size 1024x128 -define gradient:angle=90 "$style":"$color" \( +clone -flop \) +append "$output";
|
||||
optipng "$output";
|
||||
#optipng "$output";
|
||||
}
|
||||
export -f generateBootAnimationShine;
|
||||
|
||||
|
@ -461,6 +461,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
||||
@ -472,5 +475,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p472"
|
||||
editKernelLocalversion "-dos.p475"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -298,6 +298,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
||||
@ -310,5 +313,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p310"
|
||||
editKernelLocalversion "-dos.p313"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -110,7 +110,7 @@ patch -p1 < "$DOS_PATCHES/android_frameworks_base/0009-SystemUI_No_Permission_Re
|
||||
if [ "$DOS_GRAPHENE_EXEC" = true ]; then patch -p1 < "$DOS_PATCHES/android_frameworks_base/0010-Exec_Based_Spawning.patch"; fi; #add exec-based spawning support (GrapheneOS)
|
||||
patch -p1 < "$DOS_PATCHES_COMMON/android_frameworks_base/0003-SUPL_No_IMSI.patch"; #don't send IMSI to SUPL (MSe)
|
||||
patch -p1 < "$DOS_PATCHES_COMMON/android_frameworks_base/0004-Fingerprint_Lockout.patch"; #enable fingerprint failed lockout after 5 attempts (GrapheneOS)
|
||||
sed -i '301i\ if(packageList.length() > 0) { packageList += ","; } packageList += "net.sourceforge.opencamera";' core/java/android/hardware/Camera.java; #add Open Camera to aux camera whitelist
|
||||
sed -i '301i\ if(packageList.length() > 0) { packageList += ","; } packageList += "net.sourceforge.opencamera";' core/java/android/hardware/Camera.java; #add Open Camera to aux camera allowlist
|
||||
if [ "$DOS_MICROG_INCLUDED" != "FULL" ]; then rm -rf packages/CompanionDeviceManager; fi; #Used to support Android Wear (which hard depends on GMS)
|
||||
rm -rf packages/PrintRecommendationService; #Creates popups to install proprietary print apps
|
||||
|
||||
|
@ -361,6 +361,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
||||
@ -376,5 +379,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p376"
|
||||
editKernelLocalversion "-dos.p379"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -417,6 +417,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
||||
@ -429,5 +432,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p429"
|
||||
editKernelLocalversion "-dos.p432"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -279,6 +279,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.18-^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3600/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20177/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.19/0006.patch
|
||||
@ -313,6 +314,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35039/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc/^5.13/0001.patch
|
||||
@ -322,6 +324,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.19/0003.patch
|
||||
editKernelLocalversion "-dos.p323"
|
||||
editKernelLocalversion "-dos.p326"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -346,6 +346,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0606/4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1927/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1940/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0008.patch
|
||||
@ -386,5 +387,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p386"
|
||||
editKernelLocalversion "-dos.p387"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -88,6 +88,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1940/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3348/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0008.patch
|
||||
@ -130,5 +131,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p130"
|
||||
editKernelLocalversion "-dos.p131"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -449,6 +449,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
||||
@ -460,5 +463,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p460"
|
||||
editKernelLocalversion "-dos.p463"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -361,6 +361,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/^5.12/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch
|
||||
@ -373,5 +376,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
editKernelLocalversion "-dos.p373"
|
||||
editKernelLocalversion "-dos.p376"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -138,6 +138,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0606/4.14/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1927/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1940/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3348/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0007.patch
|
||||
@ -183,5 +184,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3587/4.14/0002.patch
|
||||
editKernelLocalversion "-dos.p183"
|
||||
editKernelLocalversion "-dos.p184"
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
Loading…
Reference in New Issue
Block a user