mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-12-17 11:54:26 -05:00
Update CVE patchers
Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
34f1239007
commit
d1e37f25e1
@ -68,7 +68,7 @@ external/caliper 4a0d9aba0856d0aa965d5653bfa4c138f0e8a8ba
|
||||
external/cblas d063db8bdddfcde61e4bad3bfe65941fd73e8094
|
||||
external/chromium-libpac 0ac78251d11006d764ba1aad8cc0867827fafe5c
|
||||
external/chromium-trace 8b2c0074e71a8086dee98ca8730acfdc5eddf7a1
|
||||
external/chromium-webview d84d3077a25530e7fbc7efeadcc744f04fee01e9
|
||||
external/chromium-webview 44ca512d1cf247ae2bdb432379d928c98eb39091
|
||||
external/clang 751a76679b0fb5798ea6cab75906df07edcab315
|
||||
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
|
||||
external/compiler-rt 0c46c9e892a3f68420635032ef2f6152dabd197c
|
||||
|
@ -67,7 +67,7 @@ external/capstone 6788a4139092f179005f7cdbf181ba24b60b6113
|
||||
external/cblas ddf5f49cb53866fbc503a6349bf44bac24a6963d
|
||||
external/chromium-libpac dff5ddb8d28f6ac9a86eb28763b4313f6f72eec5
|
||||
external/chromium-trace b2cf025c7d5cebd43084f38c6c7ff9cc17da428a
|
||||
external/chromium-webview d84d3077a25530e7fbc7efeadcc744f04fee01e9
|
||||
external/chromium-webview 44ca512d1cf247ae2bdb432379d928c98eb39091
|
||||
external/clang f9d2af42fc6d74c28893af371e4647158eaba66c
|
||||
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
|
||||
external/cn-cbor 7fe9f01990a97be4df5e46d2decd894c06678072
|
||||
|
@ -78,7 +78,7 @@ external/catch2 bcfbb791d09e390fb545c03ca002e570f764d960
|
||||
external/cblas 61ee00692011385347a5dd1ad872556899a5cf7a
|
||||
external/chromium-libpac c98fc96035e6fdc5b84d953d2bd38d2dcd175467
|
||||
external/chromium-trace f4e722b911fcc6f7164026432de62a02ea3460fb
|
||||
external/chromium-webview d84d3077a25530e7fbc7efeadcc744f04fee01e9
|
||||
external/chromium-webview 44ca512d1cf247ae2bdb432379d928c98eb39091
|
||||
external/clang 8343f599c9e1dda8e6c1bb779af323a673a052f9
|
||||
external/cldr 4e0bdd442c1e01f5c6147cf6032ce4f8587f4ede
|
||||
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
|
||||
|
@ -48,7 +48,7 @@ device/lge/hammerhead 5a781a1d5058c882804d7ffc27f2cf4c04cb0c2e
|
||||
device/lge/ls990 e6a600054e452e1a64d0a26c10fa1fe8db5fac66
|
||||
device/lge/mako c90ee41b093e981ef57ff4b4ab4874240cc58f9a
|
||||
device/lge/vs985 7f8fb327e60f17e9057ffd3da9773679728c0d11
|
||||
device/lineage/atv 101a8ddd11f53ff37fa8f106fc12d08b3d19ddc0
|
||||
device/lineage/atv 21c2541198f69110e375d1d678466de6dfb9da8f
|
||||
device/lineage/car ac49fa77109148dfe3d6e433e179b09d83aa1e69
|
||||
device/lineage/sepolicy 02f04d2b0a57f1c7435dc9f2ce8fac2640b38782
|
||||
device/moto/shamu 80fa688a3b208992b698a2d59a9a1fec85b1400f
|
||||
@ -135,7 +135,7 @@ external/cblas d82c5f4ae14b2a5468303985070f7dadc15d4094
|
||||
external/cbor-java f81e576298790c97498311e99a0b0b34653c3dd8
|
||||
external/chromium-libpac 169c93e00a00605346a68d39d3f4713735bdb61e
|
||||
external/chromium-trace e524766cad26d677a9a1ec8c00c512d4cac2cf5e
|
||||
external/chromium-webview d84d3077a25530e7fbc7efeadcc744f04fee01e9
|
||||
external/chromium-webview 44ca512d1cf247ae2bdb432379d928c98eb39091
|
||||
external/clang 0a1c53a5d295109bd4702ad13c0f2a5510ca1b26
|
||||
external/cldr 38850463abd624d5b2293be75fddc43cf6b55ae2
|
||||
external/cn-cbor 696530332036f5518681d3c450cdbc3ee412004a
|
||||
|
@ -36,7 +36,7 @@ device/google/contexthub c6edf884e51c6c58e83d0cf92ec5955be135aa4e
|
||||
device/google/cuttlefish 3e13bb5f5d3c8bf8928f8feeab273b10c463c410
|
||||
device/google/cuttlefish_prebuilts 164fa98acbf949eb4c87c75bd87665d86372d495
|
||||
device/google/vrservices 67138ba6299bbfa77a93a03e6d2ae37b8c96526e
|
||||
device/lineage/atv 2b2aa6e3658809984f7ca2c3a1e566765d9015c2
|
||||
device/lineage/atv ad8c610d3df9436d4167ddfa19f0ba666aa62972
|
||||
device/lineage/car 78fba94fa922f76d578f8e544a0bad83dc198680
|
||||
device/lineage/sepolicy 0ece4d9fd0fc05129d8120d26083edd6ad106ec7
|
||||
device/qcom/sepolicy 8ff9dcb710752371910f2bbcfec2ceac2cf85b00
|
||||
@ -94,7 +94,7 @@ external/catch2 2b2e0e9540defee10f28ea0fc97750490fa238b5
|
||||
external/cblas 2b24922070cb6d45edd5f5b533db0637099a2b17
|
||||
external/cbor-java 00c4a382dd3810f9c1b363eaad339cff34a3f6fe
|
||||
external/chromium-trace 138ade68f9d3388a1b0a6d9ce5e091ff6f7e7448
|
||||
external/chromium-webview d84d3077a25530e7fbc7efeadcc744f04fee01e9
|
||||
external/chromium-webview 44ca512d1cf247ae2bdb432379d928c98eb39091
|
||||
external/clang f1cef8e77ae220c9379303bdc9896e0c2366bd6f
|
||||
external/cldr 242ecd0dcb21f3376f825119ec0b36fcb15e7bb8
|
||||
external/cn-cbor 6a0f6a5375b8cd9b495e91c11d21ed257ec9a905
|
||||
@ -798,7 +798,7 @@ kernel/xiaomi/sm8150 950783ac4623027778367cb8f8c6c24f17e88dd9
|
||||
libcore 3d79b82fa5058fadc5c9696811b38a48cb5eddbb
|
||||
libnativehelper 4127df85264539c1fcc6dcbf59410e9edaa2e0c6
|
||||
lineage-sdk d4565e22e04e8030ac8d8551dfe11a868b8366a9
|
||||
lineage/scripts e00ff2fbab893d49522b12c10cd2672198bc8455
|
||||
lineage/scripts 9c3818fa8ce44d5599c074186a73419ba484515b
|
||||
packages/apps/AudioFX 2c1be3c3b062e397bfd1e780ddb0bae1f99c1b84
|
||||
packages/apps/Backgrounds f778988c6b8d36e87399b5678239d4f696e4cab2
|
||||
packages/apps/BasicSmsReceiver 7c6a070c68413bab5343043af3df220226759568
|
||||
|
@ -6,7 +6,7 @@ bootable/recovery 4c1835f494be558f71c84e3abceb3d773f6c6369
|
||||
build/bazel 9898ac01c9525bf91d23a1c2b83fc401603cb6d3
|
||||
build/bazel_common_rules f6cf03f7d0ba2e7cb05c0109a5cd57aae07dc6e8
|
||||
build/blueprint ca8f0e8e3571c866d69d34cbd47b3989abe8e8cd
|
||||
build/make d50e78868db97d16cce2e2cda900edd129674144
|
||||
build/make 2bc8b8d55c629a34e2237d7d11283370e6c99fad
|
||||
build/pesto d554620e6f7ad178b71ebb8c4269830cbd24ad8c
|
||||
build/soong c80e6e3b82f2c0fded69b44b514d4c4d5519c9b5
|
||||
cts 5f6e2dedd307f20dcf663ae17ab5db8664092430
|
||||
@ -86,7 +86,7 @@ device/lge/us996d 2c556c74bc14c6476e333d8d004b0f5e0cd75619
|
||||
device/lge/us997 deed2e1c78329e1c51ac678cab6c9459f54a2da3
|
||||
device/lge/v20-common b3421930cb63877edd288ca1ea2c58cd3c94a704
|
||||
device/lge/vs995 0089f2e8abb2b45d4da164be155a1750c7739b6f
|
||||
device/lineage/atv f4bd583dba827aaf9fc8a5faa4211bb7505bdb2d
|
||||
device/lineage/atv e4edcef65f7cce0b8656eca9417dccc69ab759b4
|
||||
device/lineage/car b588ae4550fcc9dec7427bfdba498826d8ced50c
|
||||
device/lineage/sepolicy ca9c8a7317af82df281432d1146b9be79fd7e359
|
||||
device/oneplus/avicii f993e8a369fc5cd51deaa6131d77fddaf370ded4
|
||||
@ -201,7 +201,7 @@ external/catch2 5f8628024c5a9219caa004d6a9547aacd9ba94c1
|
||||
external/cblas 4fdeda64177f60e1b226349885b3c0ea016f3068
|
||||
external/cbor-java 6b4b6adc5ff8f91e2ddef14adf510e14aaf90204
|
||||
external/chromium-trace 9456b95a6d4b95c765c9f2264a71b0334f6cf8d7
|
||||
external/chromium-webview d84d3077a25530e7fbc7efeadcc744f04fee01e9
|
||||
external/chromium-webview 44ca512d1cf247ae2bdb432379d928c98eb39091
|
||||
external/clang 9fae335badf26813486d207b69928d38b979e522
|
||||
external/cldr 7518f37169bd87d6977244e4d7471bc48fcd62e0
|
||||
external/cn-cbor 7b581886d1830f50c3ab104a56b7ab931779466f
|
||||
@ -802,7 +802,7 @@ external/zstd e6a035a8df42f375160f2acabe3caa283a0184d7
|
||||
external/zucchini 11a3a4cd409d6e0f4ccfcfb97cc962eeaeddde00
|
||||
external/zxing 248d7c742809ce1cbde1c4e6163d347e1feb274b
|
||||
frameworks/av 17fdb80d01ef17849c4d4e1100d05d29977117b2
|
||||
frameworks/base 60d7470e933152d1d2f521442ebfab213a957737
|
||||
frameworks/base eece668fc2ab2d5888c4a23d3446fb298134453f
|
||||
frameworks/compile/libbcc 81c07084cca2a6feab53eeb022f5d5a3ab5c10c5
|
||||
frameworks/compile/mclinker 18374a53dc8e00ec3667b4e1a257c9b4e41f007f
|
||||
frameworks/compile/slang 1738348ca3d011f3f340883bd48e03a8e6aeb143
|
||||
@ -1030,7 +1030,7 @@ kernel/zuk/msm8996 cc57cb4ee3b7918b74d30604735d353b9a5fa23b
|
||||
libcore 2a7d66adbcde1862f9295ae0a13f1751b193e4d7
|
||||
libnativehelper 49ecc5f1e97e810d27e2c6558abdde49e875349b
|
||||
lineage-sdk 3c88fb4dc96aaa8254cc39aabc518573bd845b76
|
||||
lineage/scripts e00ff2fbab893d49522b12c10cd2672198bc8455
|
||||
lineage/scripts 9c3818fa8ce44d5599c074186a73419ba484515b
|
||||
packages/apps/Aperture 68ad06e8d323996c66add1bb0a4d7ec1ed00bb1a
|
||||
packages/apps/AudioFX 15e2a666d21551698ea0744996abcdc35e6c0cc1
|
||||
packages/apps/Backgrounds 79f8b864a97ab942dfb4c869ed20ed00462a9974
|
||||
|
@ -1 +1 @@
|
||||
Subproject commit bcc5d3648ff1d6922a40d8e02a1d75f1afc27234
|
||||
Subproject commit 68443539a242bf9387dfb654d610352d24f0d6a4
|
@ -954,6 +954,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
|
||||
@ -966,7 +968,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p966"
|
||||
editKernelLocalversion "-dos.p968"
|
||||
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -618,6 +618,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -626,7 +628,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p626"
|
||||
editKernelLocalversion "-dos.p628"
|
||||
else echo "kernel_asus_grouper is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -655,6 +655,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
@ -664,7 +666,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p664"
|
||||
editKernelLocalversion "-dos.p666"
|
||||
else echo "kernel_htc_msm8960 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -792,6 +792,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
@ -804,7 +806,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p804"
|
||||
editKernelLocalversion "-dos.p806"
|
||||
else echo "kernel_htc_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -877,6 +877,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
@ -888,7 +890,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p888"
|
||||
editKernelLocalversion "-dos.p890"
|
||||
else echo "kernel_lge_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -744,6 +744,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -753,7 +755,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p753"
|
||||
editKernelLocalversion "-dos.p755"
|
||||
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -730,6 +730,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
@ -739,7 +741,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p739"
|
||||
editKernelLocalversion "-dos.p741"
|
||||
else echo "kernel_samsung_d2 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -415,11 +415,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p419"
|
||||
editKernelLocalversion "-dos.p421"
|
||||
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -533,6 +533,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -540,7 +542,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p540"
|
||||
editKernelLocalversion "-dos.p542"
|
||||
else echo "kernel_samsung_manta is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -547,6 +547,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -555,7 +556,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p555"
|
||||
editKernelLocalversion "-dos.p556"
|
||||
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -537,6 +537,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -545,7 +546,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p545"
|
||||
editKernelLocalversion "-dos.p546"
|
||||
else echo "kernel_samsung_tuna is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -862,9 +862,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -1087,6 +1087,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
@ -1098,7 +1100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p1098"
|
||||
editKernelLocalversion "-dos.p1100"
|
||||
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -880,6 +880,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
|
||||
@ -898,7 +900,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p898"
|
||||
editKernelLocalversion "-dos.p900"
|
||||
else echo "kernel_asus_fugu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -693,6 +693,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -703,7 +705,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p703"
|
||||
editKernelLocalversion "-dos.p705"
|
||||
else echo "kernel_asus_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -825,9 +825,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -1056,6 +1056,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
@ -1069,7 +1071,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p1069"
|
||||
editKernelLocalversion "-dos.p1071"
|
||||
else echo "kernel_google_dragon is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -686,6 +686,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
@ -697,7 +699,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p697"
|
||||
editKernelLocalversion "-dos.p699"
|
||||
else echo "kernel_htc_flounder is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -811,6 +811,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
@ -823,7 +825,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p823"
|
||||
editKernelLocalversion "-dos.p825"
|
||||
else echo "kernel_huawei_angler is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -822,6 +822,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
@ -834,7 +836,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p834"
|
||||
editKernelLocalversion "-dos.p836"
|
||||
else echo "kernel_lge_bullhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -811,10 +811,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -1050,6 +1050,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
@ -1060,7 +1062,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p1060"
|
||||
editKernelLocalversion "-dos.p1062"
|
||||
else echo "kernel_zte_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -691,6 +691,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -701,7 +703,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p701"
|
||||
editKernelLocalversion "-dos.p703"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -584,6 +584,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -591,7 +593,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p591"
|
||||
editKernelLocalversion "-dos.p593"
|
||||
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -736,6 +736,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -746,7 +748,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p746"
|
||||
editKernelLocalversion "-dos.p748"
|
||||
else echo "kernel_google_yellowstone is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -542,6 +542,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
@ -554,7 +556,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p554"
|
||||
editKernelLocalversion "-dos.p556"
|
||||
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -691,6 +691,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -701,7 +703,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p701"
|
||||
editKernelLocalversion "-dos.p703"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -735,6 +735,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
@ -744,7 +746,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p744"
|
||||
editKernelLocalversion "-dos.p746"
|
||||
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -659,6 +659,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -668,7 +670,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p668"
|
||||
editKernelLocalversion "-dos.p670"
|
||||
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -661,6 +661,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -670,7 +672,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p670"
|
||||
editKernelLocalversion "-dos.p672"
|
||||
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -626,6 +626,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||
@ -633,7 +634,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
||||
@ -815,6 +815,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.14/0003.patch
|
||||
@ -1108,6 +1109,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
||||
@ -1115,7 +1119,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1115"
|
||||
editKernelLocalversion "-dos.p1119"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -572,12 +572,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -908,6 +908,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
@ -916,7 +918,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p916"
|
||||
editKernelLocalversion "-dos.p918"
|
||||
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -398,10 +398,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p401"
|
||||
editKernelLocalversion "-dos.p403"
|
||||
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -625,10 +625,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -862,6 +862,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
@ -874,7 +876,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p874"
|
||||
editKernelLocalversion "-dos.p876"
|
||||
else echo "kernel_google_marlin is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -575,6 +575,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
|
||||
@ -585,7 +587,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p585"
|
||||
editKernelLocalversion "-dos.p587"
|
||||
else echo "kernel_google_msm is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -685,6 +685,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
||||
@ -695,7 +697,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p695"
|
||||
editKernelLocalversion "-dos.p697"
|
||||
else echo "kernel_htc_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -612,6 +612,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -619,7 +621,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p619"
|
||||
editKernelLocalversion "-dos.p621"
|
||||
else echo "kernel_lge_g3 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -549,6 +549,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -557,7 +559,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p557"
|
||||
editKernelLocalversion "-dos.p559"
|
||||
else echo "kernel_lge_hammerhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -192,10 +192,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p195"
|
||||
editKernelLocalversion "-dos.p197"
|
||||
else echo "kernel_lge_mako is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -597,13 +597,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p603"
|
||||
editKernelLocalversion "-dos.p605"
|
||||
else echo "kernel_lge_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -578,6 +578,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
@ -591,7 +593,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p591"
|
||||
editKernelLocalversion "-dos.p593"
|
||||
else echo "kernel_moto_shamu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -666,6 +666,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
@ -674,7 +676,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p674"
|
||||
editKernelLocalversion "-dos.p676"
|
||||
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -642,10 +642,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -886,6 +886,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
@ -895,7 +897,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p895"
|
||||
editKernelLocalversion "-dos.p897"
|
||||
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -711,6 +711,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
@ -720,7 +722,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p720"
|
||||
editKernelLocalversion "-dos.p722"
|
||||
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -630,10 +630,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -874,6 +874,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
@ -883,7 +885,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p883"
|
||||
editKernelLocalversion "-dos.p885"
|
||||
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -540,11 +540,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p544"
|
||||
editKernelLocalversion "-dos.p546"
|
||||
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -613,6 +613,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
@ -623,7 +625,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p623"
|
||||
editKernelLocalversion "-dos.p625"
|
||||
else echo "kernel_samsung_jf is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -695,6 +695,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
||||
@ -707,7 +709,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p707"
|
||||
editKernelLocalversion "-dos.p709"
|
||||
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -426,10 +426,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p429"
|
||||
editKernelLocalversion "-dos.p431"
|
||||
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -202,13 +202,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -556,11 +556,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p560"
|
||||
editKernelLocalversion "-dos.p562"
|
||||
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -706,6 +706,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||
@ -713,7 +714,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
||||
@ -897,6 +897,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.14/0003.patch
|
||||
@ -1189,6 +1190,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
@ -1199,7 +1203,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1199"
|
||||
editKernelLocalversion "-dos.p1203"
|
||||
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -239,12 +239,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -581,6 +581,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
@ -588,7 +590,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p588"
|
||||
editKernelLocalversion "-dos.p590"
|
||||
else echo "kernel_essential_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -476,6 +476,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -485,7 +487,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p485"
|
||||
editKernelLocalversion "-dos.p487"
|
||||
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -152,6 +152,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
|
||||
@ -509,13 +511,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p515"
|
||||
editKernelLocalversion "-dos.p522"
|
||||
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -188,12 +188,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch
|
||||
@ -534,11 +534,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p538"
|
||||
editKernelLocalversion "-dos.p540"
|
||||
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -152,6 +152,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
|
||||
@ -509,13 +511,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p515"
|
||||
editKernelLocalversion "-dos.p522"
|
||||
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -107,6 +107,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/5.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
|
||||
@ -117,7 +118,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0597/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/5.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1078/5.10/0003.patch
|
||||
@ -430,6 +430,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23196/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/5.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/5.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23850/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
@ -1022,6 +1024,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46783/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46791/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46798/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46802/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46804/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46810/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46814/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46815/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46817/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46818/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46819/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46826/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46828/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46832/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46849/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46853/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch
|
||||
@ -1032,7 +1052,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
|
||||
editKernelLocalversion "-dos.p1032"
|
||||
editKernelLocalversion "-dos.p1052"
|
||||
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -107,6 +107,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/5.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
|
||||
@ -117,7 +118,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/5.10/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0597/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/5.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1078/5.10/0003.patch
|
||||
@ -428,6 +428,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23196/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/5.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/5.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23850/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
@ -1020,6 +1022,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46783/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46791/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46798/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46802/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46804/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46810/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46814/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46815/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46817/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46818/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46819/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46826/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46828/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46832/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46849/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46853/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch
|
||||
@ -1030,7 +1050,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
|
||||
editKernelLocalversion "-dos.p1030"
|
||||
editKernelLocalversion "-dos.p1050"
|
||||
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -169,6 +169,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
|
||||
@ -488,12 +489,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p493"
|
||||
editKernelLocalversion "-dos.p497"
|
||||
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -479,6 +479,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -488,7 +490,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p488"
|
||||
editKernelLocalversion "-dos.p490"
|
||||
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -138,6 +138,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||
@ -146,7 +147,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.19/0006.patch
|
||||
@ -356,6 +356,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.19/0004.patch
|
||||
@ -722,13 +724,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p728"
|
||||
editKernelLocalversion "-dos.p735"
|
||||
else echo "kernel_google_redbull is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -203,12 +203,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -550,6 +550,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
@ -557,7 +559,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p557"
|
||||
editKernelLocalversion "-dos.p559"
|
||||
else echo "kernel_google_wahoo is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -188,12 +188,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch
|
||||
@ -534,11 +534,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p538"
|
||||
editKernelLocalversion "-dos.p540"
|
||||
else echo "kernel_lge_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -189,13 +189,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -538,11 +538,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p542"
|
||||
editKernelLocalversion "-dos.p544"
|
||||
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -486,6 +486,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -495,7 +497,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p495"
|
||||
editKernelLocalversion "-dos.p497"
|
||||
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -182,6 +182,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
|
||||
@ -561,13 +563,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p567"
|
||||
editKernelLocalversion "-dos.p574"
|
||||
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -672,6 +672,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||
@ -679,7 +680,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
||||
@ -863,6 +863,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.14/0003.patch
|
||||
@ -1154,6 +1155,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
@ -1163,7 +1167,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1163"
|
||||
editKernelLocalversion "-dos.p1167"
|
||||
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -150,6 +150,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
|
||||
@ -507,13 +509,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p513"
|
||||
editKernelLocalversion "-dos.p520"
|
||||
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -617,6 +617,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46783/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46798/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46810/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46815/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46817/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46818/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46828/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46853/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
|
||||
@ -628,7 +639,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
|
||||
editKernelLocalversion "-dos.p628"
|
||||
editKernelLocalversion "-dos.p639"
|
||||
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -188,12 +188,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch
|
||||
@ -534,11 +534,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p538"
|
||||
editKernelLocalversion "-dos.p540"
|
||||
else echo "kernel_razer_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -482,6 +482,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -491,7 +493,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p491"
|
||||
editKernelLocalversion "-dos.p493"
|
||||
else echo "kernel_razer_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -745,10 +745,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.9/0005.patch
|
||||
@ -1089,6 +1089,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||
@ -1097,7 +1099,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1097"
|
||||
editKernelLocalversion "-dos.p1099"
|
||||
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -199,12 +199,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -549,11 +549,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p553"
|
||||
editKernelLocalversion "-dos.p555"
|
||||
else echo "kernel_sony_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -589,11 +589,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
||||
@ -959,6 +959,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0004.patch
|
||||
@ -974,7 +976,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p974"
|
||||
editKernelLocalversion "-dos.p976"
|
||||
else echo "kernel_sony_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -476,6 +476,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -485,7 +487,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p485"
|
||||
editKernelLocalversion "-dos.p487"
|
||||
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -489,6 +489,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
@ -498,7 +500,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p498"
|
||||
editKernelLocalversion "-dos.p500"
|
||||
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -202,6 +202,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
|
||||
@ -527,12 +528,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p532"
|
||||
editKernelLocalversion "-dos.p536"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -127,6 +127,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/4.19/0007.patch
|
||||
@ -392,10 +394,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p395"
|
||||
editKernelLocalversion "-dos.p402"
|
||||
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -207,6 +207,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
|
||||
@ -529,12 +530,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p534"
|
||||
editKernelLocalversion "-dos.p538"
|
||||
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
@ -198,12 +198,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
@ -549,12 +549,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p554"
|
||||
editKernelLocalversion "-dos.p556"
|
||||
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
Loading…
Reference in New Issue
Block a user