mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2025-05-02 14:36:17 -04:00
Update CVE patchers
Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
parent
4f4d760687
commit
dc9ed7c46c
79 changed files with 558 additions and 79 deletions
|
@ -394,6 +394,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46909/^5.12/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46932/4.4/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46939/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47086/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47114/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47118/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47121/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47122/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0008.patch
|
||||
|
@ -494,8 +498,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52599/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52602/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52603/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26633/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -503,7 +511,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
editKernelLocalversion "-dos.p503"
|
||||
editKernelLocalversion "-dos.p511"
|
||||
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -351,6 +351,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46932/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46946/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47086/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47114/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47118/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47122/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0049.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch
|
||||
|
@ -458,7 +461,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
editKernelLocalversion "-dos.p458"
|
||||
editKernelLocalversion "-dos.p461"
|
||||
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -456,6 +456,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46909/^5.12/0001.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46932/4.4/0004.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46939/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47086/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47114/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47117/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47118/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47121/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47122/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch
|
||||
|
@ -540,8 +545,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52599/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52602/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52603/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
|
||||
|
@ -549,7 +557,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
editKernelLocalversion "-dos.p549"
|
||||
editKernelLocalversion "-dos.p557"
|
||||
else echo "kernel_google_yellowstone is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
|
@ -261,6 +261,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46932/4.4/0004.patch
|
|||
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46939/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46946/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47086/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47114/4.4/0004.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47118/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47121/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47122/3.18/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0065.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch
|
||||
|
@ -344,8 +348,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52599/4.4/0008.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52602/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52603/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/^6.8/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.4/0008.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26633/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.4/0001.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
|
||||
|
@ -355,7 +363,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
|
|||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
|
||||
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
|
||||
editKernelLocalversion "-dos.p355"
|
||||
editKernelLocalversion "-dos.p363"
|
||||
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
|
||||
fi;
|
||||
cd "$DOS_BUILD_BASE"
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue