mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-05-15 12:52:20 -04:00
Update CVE patchers
Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
34f1239007
commit
d1e37f25e1
84 changed files with 354 additions and 115 deletions
|
@ -954,6 +954,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
|
||||
|
@ -966,7 +968,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p966"
|
||||
editKernelLocalversion "-dos.p968"
|
||||
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -618,6 +618,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -626,7 +628,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p626"
|
||||
editKernelLocalversion "-dos.p628"
|
||||
else echo "kernel_asus_grouper is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -655,6 +655,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
|
@ -664,7 +666,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p664"
|
||||
editKernelLocalversion "-dos.p666"
|
||||
else echo "kernel_htc_msm8960 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -792,6 +792,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
|
@ -804,7 +806,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p804"
|
||||
editKernelLocalversion "-dos.p806"
|
||||
else echo "kernel_htc_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -877,6 +877,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
|
@ -888,7 +890,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p888"
|
||||
editKernelLocalversion "-dos.p890"
|
||||
else echo "kernel_lge_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -744,6 +744,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -753,7 +755,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p753"
|
||||
editKernelLocalversion "-dos.p755"
|
||||
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -730,6 +730,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
|
@ -739,7 +741,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p739"
|
||||
editKernelLocalversion "-dos.p741"
|
||||
else echo "kernel_samsung_d2 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -415,11 +415,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p419"
|
||||
editKernelLocalversion "-dos.p421"
|
||||
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -533,6 +533,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -540,7 +542,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p540"
|
||||
editKernelLocalversion "-dos.p542"
|
||||
else echo "kernel_samsung_manta is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -547,6 +547,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -555,7 +556,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p555"
|
||||
editKernelLocalversion "-dos.p556"
|
||||
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -537,6 +537,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -545,7 +546,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p545"
|
||||
editKernelLocalversion "-dos.p546"
|
||||
else echo "kernel_samsung_tuna is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -862,9 +862,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -1087,6 +1087,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
|
@ -1098,7 +1100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p1098"
|
||||
editKernelLocalversion "-dos.p1100"
|
||||
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -880,6 +880,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
|
||||
|
@ -898,7 +900,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p898"
|
||||
editKernelLocalversion "-dos.p900"
|
||||
else echo "kernel_asus_fugu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -693,6 +693,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -703,7 +705,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p703"
|
||||
editKernelLocalversion "-dos.p705"
|
||||
else echo "kernel_asus_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -825,9 +825,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -1056,6 +1056,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
|
@ -1069,7 +1071,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p1069"
|
||||
editKernelLocalversion "-dos.p1071"
|
||||
else echo "kernel_google_dragon is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -686,6 +686,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
|
@ -697,7 +699,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p697"
|
||||
editKernelLocalversion "-dos.p699"
|
||||
else echo "kernel_htc_flounder is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -811,6 +811,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
|
@ -823,7 +825,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p823"
|
||||
editKernelLocalversion "-dos.p825"
|
||||
else echo "kernel_huawei_angler is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -822,6 +822,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
|
||||
|
@ -834,7 +836,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p834"
|
||||
editKernelLocalversion "-dos.p836"
|
||||
else echo "kernel_lge_bullhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -811,10 +811,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -1050,6 +1050,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
|
@ -1060,7 +1062,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p1060"
|
||||
editKernelLocalversion "-dos.p1062"
|
||||
else echo "kernel_zte_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -691,6 +691,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -701,7 +703,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p701"
|
||||
editKernelLocalversion "-dos.p703"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -584,6 +584,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -591,7 +593,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p591"
|
||||
editKernelLocalversion "-dos.p593"
|
||||
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -736,6 +736,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -746,7 +748,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p746"
|
||||
editKernelLocalversion "-dos.p748"
|
||||
else echo "kernel_google_yellowstone is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -542,6 +542,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
|
@ -554,7 +556,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p554"
|
||||
editKernelLocalversion "-dos.p556"
|
||||
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -691,6 +691,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -701,7 +703,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p701"
|
||||
editKernelLocalversion "-dos.p703"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -735,6 +735,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
|
@ -744,7 +746,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p744"
|
||||
editKernelLocalversion "-dos.p746"
|
||||
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -659,6 +659,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -668,7 +670,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p668"
|
||||
editKernelLocalversion "-dos.p670"
|
||||
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -661,6 +661,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -670,7 +672,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p670"
|
||||
editKernelLocalversion "-dos.p672"
|
||||
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -626,6 +626,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||
|
@ -633,7 +634,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
||||
|
@ -815,6 +815,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.14/0003.patch
|
||||
|
@ -1108,6 +1109,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
|
||||
|
@ -1115,7 +1119,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1115"
|
||||
editKernelLocalversion "-dos.p1119"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -572,12 +572,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -908,6 +908,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
|
||||
|
@ -916,7 +918,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p916"
|
||||
editKernelLocalversion "-dos.p918"
|
||||
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -398,10 +398,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p401"
|
||||
editKernelLocalversion "-dos.p403"
|
||||
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -625,10 +625,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -862,6 +862,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
|
||||
|
@ -874,7 +876,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p874"
|
||||
editKernelLocalversion "-dos.p876"
|
||||
else echo "kernel_google_marlin is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -575,6 +575,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
|
||||
|
@ -585,7 +587,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p585"
|
||||
editKernelLocalversion "-dos.p587"
|
||||
else echo "kernel_google_msm is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -685,6 +685,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
||||
|
@ -695,7 +697,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p695"
|
||||
editKernelLocalversion "-dos.p697"
|
||||
else echo "kernel_htc_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -612,6 +612,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -619,7 +621,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p619"
|
||||
editKernelLocalversion "-dos.p621"
|
||||
else echo "kernel_lge_g3 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -549,6 +549,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -557,7 +559,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p557"
|
||||
editKernelLocalversion "-dos.p559"
|
||||
else echo "kernel_lge_hammerhead is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -192,10 +192,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p195"
|
||||
editKernelLocalversion "-dos.p197"
|
||||
else echo "kernel_lge_mako is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -597,13 +597,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p603"
|
||||
editKernelLocalversion "-dos.p605"
|
||||
else echo "kernel_lge_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -578,6 +578,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
|
@ -591,7 +593,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p591"
|
||||
editKernelLocalversion "-dos.p593"
|
||||
else echo "kernel_moto_shamu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -666,6 +666,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
|
@ -674,7 +676,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p674"
|
||||
editKernelLocalversion "-dos.p676"
|
||||
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -642,10 +642,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -886,6 +886,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
|
@ -895,7 +897,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p895"
|
||||
editKernelLocalversion "-dos.p897"
|
||||
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -711,6 +711,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -720,7 +722,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p720"
|
||||
editKernelLocalversion "-dos.p722"
|
||||
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -630,10 +630,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -874,6 +874,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
|
||||
|
@ -883,7 +885,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p883"
|
||||
editKernelLocalversion "-dos.p885"
|
||||
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -540,11 +540,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p544"
|
||||
editKernelLocalversion "-dos.p546"
|
||||
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -613,6 +613,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
|
@ -623,7 +625,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p623"
|
||||
editKernelLocalversion "-dos.p625"
|
||||
else echo "kernel_samsung_jf is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -695,6 +695,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
|
||||
|
@ -707,7 +709,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p707"
|
||||
editKernelLocalversion "-dos.p709"
|
||||
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -426,10 +426,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p429"
|
||||
editKernelLocalversion "-dos.p431"
|
||||
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -202,13 +202,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -556,11 +556,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p560"
|
||||
editKernelLocalversion "-dos.p562"
|
||||
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -706,6 +706,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||
|
@ -713,7 +714,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
||||
|
@ -897,6 +897,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.14/0003.patch
|
||||
|
@ -1189,6 +1190,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
|
@ -1199,7 +1203,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1199"
|
||||
editKernelLocalversion "-dos.p1203"
|
||||
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -239,12 +239,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -581,6 +581,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
|
@ -588,7 +590,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p588"
|
||||
editKernelLocalversion "-dos.p590"
|
||||
else echo "kernel_essential_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -476,6 +476,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -485,7 +487,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p485"
|
||||
editKernelLocalversion "-dos.p487"
|
||||
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -152,6 +152,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
|
||||
|
@ -509,13 +511,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p515"
|
||||
editKernelLocalversion "-dos.p522"
|
||||
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -188,12 +188,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch
|
||||
|
@ -534,11 +534,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p538"
|
||||
editKernelLocalversion "-dos.p540"
|
||||
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -152,6 +152,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
|
||||
|
@ -509,13 +511,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p515"
|
||||
editKernelLocalversion "-dos.p522"
|
||||
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -107,6 +107,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/5.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
|
||||
|
@ -117,7 +118,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/5.10/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0597/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/5.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1078/5.10/0003.patch
|
||||
|
@ -430,6 +430,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23196/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/5.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/5.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23850/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
|
@ -1022,6 +1024,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46783/5.10/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46791/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46798/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46802/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46804/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46810/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46814/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46815/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46817/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46818/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46819/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46826/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46828/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46832/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46849/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46853/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch
|
||||
|
@ -1032,7 +1052,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
|
||||
editKernelLocalversion "-dos.p1032"
|
||||
editKernelLocalversion "-dos.p1052"
|
||||
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -107,6 +107,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/5.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
|
||||
|
@ -117,7 +118,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/5.10/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0597/^6.1/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/5.10/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1078/5.10/0003.patch
|
||||
|
@ -428,6 +428,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23196/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/5.10/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/5.10/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23850/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
|
@ -1020,6 +1022,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46783/5.10/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46791/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46798/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46802/^6.9/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46804/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46810/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46814/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46815/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46817/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46818/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46819/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46826/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46828/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46832/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/5.10/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46849/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46853/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch
|
||||
|
@ -1030,7 +1050,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
|
||||
editKernelLocalversion "-dos.p1030"
|
||||
editKernelLocalversion "-dos.p1050"
|
||||
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -169,6 +169,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
|
||||
|
@ -488,12 +489,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p493"
|
||||
editKernelLocalversion "-dos.p497"
|
||||
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -479,6 +479,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -488,7 +490,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p488"
|
||||
editKernelLocalversion "-dos.p490"
|
||||
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -138,6 +138,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.19/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
|
||||
|
@ -146,7 +147,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.19/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.19/0006.patch
|
||||
|
@ -356,6 +356,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.19/0004.patch
|
||||
|
@ -722,13 +724,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p728"
|
||||
editKernelLocalversion "-dos.p735"
|
||||
else echo "kernel_google_redbull is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -203,12 +203,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -550,6 +550,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
|
||||
|
@ -557,7 +559,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p557"
|
||||
editKernelLocalversion "-dos.p559"
|
||||
else echo "kernel_google_wahoo is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -188,12 +188,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch
|
||||
|
@ -534,11 +534,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p538"
|
||||
editKernelLocalversion "-dos.p540"
|
||||
else echo "kernel_lge_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -189,13 +189,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -538,11 +538,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p542"
|
||||
editKernelLocalversion "-dos.p544"
|
||||
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -486,6 +486,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -495,7 +497,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p495"
|
||||
editKernelLocalversion "-dos.p497"
|
||||
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -182,6 +182,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
|
||||
|
@ -561,13 +563,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p567"
|
||||
editKernelLocalversion "-dos.p574"
|
||||
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -672,6 +672,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||
|
@ -679,7 +680,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0459/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.14/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
||||
|
@ -863,6 +863,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24856/4.14/0003.patch
|
||||
|
@ -1154,6 +1155,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
|
||||
|
@ -1163,7 +1167,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1163"
|
||||
editKernelLocalversion "-dos.p1167"
|
||||
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -150,6 +150,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch
|
||||
|
@ -507,13 +509,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p513"
|
||||
editKernelLocalversion "-dos.p520"
|
||||
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -617,6 +617,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/5.4/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46783/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46798/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46810/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46815/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46817/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46818/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46828/5.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/5.4/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46853/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
|
||||
|
@ -628,7 +639,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
|
||||
editKernelLocalversion "-dos.p628"
|
||||
editKernelLocalversion "-dos.p639"
|
||||
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -188,12 +188,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch
|
||||
|
@ -534,11 +534,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p538"
|
||||
editKernelLocalversion "-dos.p540"
|
||||
else echo "kernel_razer_msm8998 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -482,6 +482,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -491,7 +493,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p491"
|
||||
editKernelLocalversion "-dos.p493"
|
||||
else echo "kernel_razer_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -745,10 +745,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.9/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.9/0005.patch
|
||||
|
@ -1089,6 +1089,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
|
||||
|
@ -1097,7 +1099,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p1097"
|
||||
editKernelLocalversion "-dos.p1099"
|
||||
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -199,12 +199,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -549,11 +549,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p553"
|
||||
editKernelLocalversion "-dos.p555"
|
||||
else echo "kernel_sony_sdm660 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -589,11 +589,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.9/0005.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.9/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.14/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
|
||||
|
@ -959,6 +959,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0004.patch
|
||||
|
@ -974,7 +976,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p974"
|
||||
editKernelLocalversion "-dos.p976"
|
||||
else echo "kernel_sony_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -476,6 +476,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -485,7 +487,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p485"
|
||||
editKernelLocalversion "-dos.p487"
|
||||
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -489,6 +489,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
|
||||
|
@ -498,7 +500,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p498"
|
||||
editKernelLocalversion "-dos.p500"
|
||||
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -202,6 +202,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.14/0009.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
|
||||
|
@ -527,12 +528,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p532"
|
||||
editKernelLocalversion "-dos.p536"
|
||||
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -127,6 +127,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/4.19/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/4.19/0007.patch
|
||||
|
@ -392,10 +394,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46782/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
|
||||
editKernelLocalversion "-dos.p395"
|
||||
editKernelLocalversion "-dos.p402"
|
||||
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -207,6 +207,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
|
||||
|
@ -529,12 +530,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.19/0002.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46761/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
|
||||
editKernelLocalversion "-dos.p534"
|
||||
editKernelLocalversion "-dos.p538"
|
||||
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -198,12 +198,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch
|
||||
|
@ -549,12 +549,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
|
||||
editKernelLocalversion "-dos.p554"
|
||||
editKernelLocalversion "-dos.p556"
|
||||
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue