Update CVE patchers

Likely breakage
CVE-2022-48781 maybe change to 5.16-^5.17

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-07-18 13:36:15 -04:00
parent c250665b4f
commit e6f816f4a0
No known key found for this signature in database
GPG key ID: E599F62ECBAEAF2E
82 changed files with 1440 additions and 119 deletions

View file

@ -94,6 +94,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48627/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0004.patch
@ -132,6 +135,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52670/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
@ -342,15 +346,44 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39488/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39489/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40904/3.5-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40911/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40912/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40917/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40923/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40932/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40941/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40942/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40943/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40954/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40958/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40959/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40961/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40974/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40978/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40984/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40993/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p350"
editKernelLocalversion "-dos.p383"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"