Update CVE patchers

Likely breakage

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-07-31 22:17:55 -04:00
parent 0c4b0672e4
commit 094b4f4f41
84 changed files with 1202 additions and 85 deletions

View File

@ -68,7 +68,7 @@ external/caliper 4a0d9aba0856d0aa965d5653bfa4c138f0e8a8ba
external/cblas d063db8bdddfcde61e4bad3bfe65941fd73e8094
external/chromium-libpac 0ac78251d11006d764ba1aad8cc0867827fafe5c
external/chromium-trace 8b2c0074e71a8086dee98ca8730acfdc5eddf7a1
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/chromium-webview 5ce207a3acf1eda3f76efdf3e4b7895ab1bf21eb
external/clang 751a76679b0fb5798ea6cab75906df07edcab315
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
external/compiler-rt 0c46c9e892a3f68420635032ef2f6152dabd197c

View File

@ -67,7 +67,7 @@ external/capstone 6788a4139092f179005f7cdbf181ba24b60b6113
external/cblas ddf5f49cb53866fbc503a6349bf44bac24a6963d
external/chromium-libpac dff5ddb8d28f6ac9a86eb28763b4313f6f72eec5
external/chromium-trace b2cf025c7d5cebd43084f38c6c7ff9cc17da428a
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/chromium-webview 5ce207a3acf1eda3f76efdf3e4b7895ab1bf21eb
external/clang f9d2af42fc6d74c28893af371e4647158eaba66c
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
external/cn-cbor 7fe9f01990a97be4df5e46d2decd894c06678072

View File

@ -78,7 +78,7 @@ external/catch2 bcfbb791d09e390fb545c03ca002e570f764d960
external/cblas 61ee00692011385347a5dd1ad872556899a5cf7a
external/chromium-libpac c98fc96035e6fdc5b84d953d2bd38d2dcd175467
external/chromium-trace f4e722b911fcc6f7164026432de62a02ea3460fb
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/chromium-webview 5ce207a3acf1eda3f76efdf3e4b7895ab1bf21eb
external/clang 8343f599c9e1dda8e6c1bb779af323a673a052f9
external/cldr 4e0bdd442c1e01f5c6147cf6032ce4f8587f4ede
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4

View File

@ -135,7 +135,7 @@ external/cblas d82c5f4ae14b2a5468303985070f7dadc15d4094
external/cbor-java f81e576298790c97498311e99a0b0b34653c3dd8
external/chromium-libpac 169c93e00a00605346a68d39d3f4713735bdb61e
external/chromium-trace e524766cad26d677a9a1ec8c00c512d4cac2cf5e
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/chromium-webview 5ce207a3acf1eda3f76efdf3e4b7895ab1bf21eb
external/clang 0a1c53a5d295109bd4702ad13c0f2a5510ca1b26
external/cldr 38850463abd624d5b2293be75fddc43cf6b55ae2
external/cn-cbor 696530332036f5518681d3c450cdbc3ee412004a

View File

@ -94,7 +94,7 @@ external/catch2 2b2e0e9540defee10f28ea0fc97750490fa238b5
external/cblas 2b24922070cb6d45edd5f5b533db0637099a2b17
external/cbor-java 00c4a382dd3810f9c1b363eaad339cff34a3f6fe
external/chromium-trace 138ade68f9d3388a1b0a6d9ce5e091ff6f7e7448
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/chromium-webview 5ce207a3acf1eda3f76efdf3e4b7895ab1bf21eb
external/clang f1cef8e77ae220c9379303bdc9896e0c2366bd6f
external/cldr 242ecd0dcb21f3376f825119ec0b36fcb15e7bb8
external/cn-cbor 6a0f6a5375b8cd9b495e91c11d21ed257ec9a905

View File

@ -201,7 +201,7 @@ external/catch2 5f8628024c5a9219caa004d6a9547aacd9ba94c1
external/cblas 4fdeda64177f60e1b226349885b3c0ea016f3068
external/cbor-java 6b4b6adc5ff8f91e2ddef14adf510e14aaf90204
external/chromium-trace 9456b95a6d4b95c765c9f2264a71b0334f6cf8d7
external/chromium-webview f7bf9722e3d25fb06ec45fbd244c40f709fa0e83
external/chromium-webview 5ce207a3acf1eda3f76efdf3e4b7895ab1bf21eb
external/clang 9fae335badf26813486d207b69928d38b979e522
external/cldr 7518f37169bd87d6977244e4d7471bc48fcd62e0
external/cn-cbor 7b581886d1830f50c3ab104a56b7ab931779466f
@ -802,7 +802,7 @@ external/zstd e6a035a8df42f375160f2acabe3caa283a0184d7
external/zucchini 11a3a4cd409d6e0f4ccfcfb97cc962eeaeddde00
external/zxing 248d7c742809ce1cbde1c4e6163d347e1feb274b
frameworks/av 214685e2de63df75def32de6356a4d2853f5d5b7
frameworks/base 1503d7e0f6b5ad75805e738b4ba0bd3ce1465553
frameworks/base c9f788e34af3e55b9c544e1fe1cad94927ebd15e
frameworks/compile/libbcc 81c07084cca2a6feab53eeb022f5d5a3ab5c10c5
frameworks/compile/mclinker 18374a53dc8e00ec3667b4e1a257c9b4e41f007f
frameworks/compile/slang 1738348ca3d011f3f340883bd48e03a8e6aeb143

@ -1 +1 @@
Subproject commit 2cf58fb7882c5558e3fca1bc00f8dae58dba9ca8
Subproject commit d11b50e0b28245236dc2bf3bad59f06a89c0ae69

View File

@ -925,6 +925,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
@ -937,7 +940,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p937"
editKernelLocalversion "-dos.p940"
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -588,6 +588,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -596,7 +599,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p596"
editKernelLocalversion "-dos.p599"
else echo "kernel_asus_grouper is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -625,6 +625,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
@ -634,7 +637,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p634"
editKernelLocalversion "-dos.p637"
else echo "kernel_htc_msm8960 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -748,6 +748,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
@ -760,7 +768,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p760"
editKernelLocalversion "-dos.p768"
else echo "kernel_htc_msm8994 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -834,6 +834,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -845,7 +853,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p845"
editKernelLocalversion "-dos.p853"
else echo "kernel_lge_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -700,6 +700,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -709,7 +717,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p709"
editKernelLocalversion "-dos.p717"
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -700,6 +700,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
@ -709,7 +712,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p709"
editKernelLocalversion "-dos.p712"
else echo "kernel_samsung_d2 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -384,11 +384,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p388"
editKernelLocalversion "-dos.p391"
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -503,6 +503,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -510,7 +513,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p510"
editKernelLocalversion "-dos.p513"
else echo "kernel_samsung_manta is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -521,6 +521,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -529,7 +531,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p529"
editKernelLocalversion "-dos.p531"
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -513,6 +513,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -521,7 +523,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p521"
editKernelLocalversion "-dos.p523"
else echo "kernel_samsung_tuna is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1032,6 +1032,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -1043,7 +1053,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1043"
editKernelLocalversion "-dos.p1053"
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -838,6 +838,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
@ -856,7 +864,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p856"
editKernelLocalversion "-dos.p864"
else echo "kernel_asus_fugu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -648,6 +648,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -658,7 +666,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p658"
editKernelLocalversion "-dos.p666"
else echo "kernel_asus_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1000,6 +1000,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -1013,7 +1023,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1013"
editKernelLocalversion "-dos.p1023"
else echo "kernel_google_dragon is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -642,6 +642,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -653,7 +661,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p653"
editKernelLocalversion "-dos.p661"
else echo "kernel_htc_flounder is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -768,6 +768,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
@ -780,7 +788,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p780"
editKernelLocalversion "-dos.p788"
else echo "kernel_huawei_angler is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -779,6 +779,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
@ -791,7 +799,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p791"
editKernelLocalversion "-dos.p799"
else echo "kernel_lge_bullhead is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -990,6 +990,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -1000,7 +1010,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1000"
editKernelLocalversion "-dos.p1010"
else echo "kernel_zte_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -646,6 +646,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -656,7 +664,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p656"
editKernelLocalversion "-dos.p664"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -554,6 +554,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -561,7 +564,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p561"
editKernelLocalversion "-dos.p564"
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -693,6 +693,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -703,7 +710,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p703"
editKernelLocalversion "-dos.p710"
else echo "kernel_google_yellowstone is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -497,6 +497,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
@ -509,7 +517,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p509"
editKernelLocalversion "-dos.p517"
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -646,6 +646,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -656,7 +664,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p656"
editKernelLocalversion "-dos.p664"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -692,6 +692,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -701,7 +709,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p701"
editKernelLocalversion "-dos.p709"
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -614,6 +614,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -623,7 +631,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p623"
editKernelLocalversion "-dos.p631"
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -616,6 +616,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -625,7 +633,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p625"
editKernelLocalversion "-dos.p633"
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -963,13 +963,41 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p969"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p997"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -823,6 +823,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
@ -831,7 +841,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p831"
editKernelLocalversion "-dos.p841"
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -368,10 +368,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p371"
editKernelLocalversion "-dos.p374"
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -807,6 +807,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
@ -819,7 +829,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p819"
editKernelLocalversion "-dos.p829"
else echo "kernel_google_marlin is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -545,6 +545,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
@ -555,7 +558,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p555"
editKernelLocalversion "-dos.p558"
else echo "kernel_google_msm is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -655,6 +655,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -665,7 +668,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p665"
editKernelLocalversion "-dos.p668"
else echo "kernel_htc_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -582,6 +582,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -589,7 +592,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p589"
editKernelLocalversion "-dos.p592"
else echo "kernel_lge_g3 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -519,6 +519,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -527,7 +530,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p527"
editKernelLocalversion "-dos.p530"
else echo "kernel_lge_hammerhead is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -162,10 +162,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p165"
editKernelLocalversion "-dos.p168"
else echo "kernel_lge_mako is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -567,13 +567,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p573"
editKernelLocalversion "-dos.p576"
else echo "kernel_lge_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -532,6 +532,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
@ -545,7 +553,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p545"
editKernelLocalversion "-dos.p553"
else echo "kernel_moto_shamu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -636,6 +636,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -644,7 +647,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p644"
editKernelLocalversion "-dos.p647"
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -826,6 +826,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -835,7 +845,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p835"
editKernelLocalversion "-dos.p845"
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -666,6 +666,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -675,7 +683,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p675"
editKernelLocalversion "-dos.p683"
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -814,6 +814,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
@ -823,7 +833,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p823"
editKernelLocalversion "-dos.p833"
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -510,11 +510,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p514"
editKernelLocalversion "-dos.p517"
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -583,6 +583,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
@ -593,7 +596,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p593"
editKernelLocalversion "-dos.p596"
else echo "kernel_samsung_jf is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -665,6 +665,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -677,7 +680,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p677"
editKernelLocalversion "-dos.p680"
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -396,10 +396,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p399"
editKernelLocalversion "-dos.p402"
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -465,11 +465,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p469"
editKernelLocalversion "-dos.p479"
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1042,6 +1042,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1051,7 +1077,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p1051"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1078"
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -491,6 +491,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -498,7 +509,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p498"
editKernelLocalversion "-dos.p509"
else echo "kernel_essential_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -375,6 +375,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -383,7 +407,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p383"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p408"
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -383,12 +383,50 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p388"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p426"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -442,11 +442,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p446"
editKernelLocalversion "-dos.p457"
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -383,12 +383,50 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p388"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p426"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -390,6 +390,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52882/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52887/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0565/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch
@ -796,8 +797,61 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41022/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41040/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41064/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41065/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41070/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41078/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41090/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41091/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41092/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42076/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42093/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42120/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42121/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42124/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42127/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42152/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42161/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -806,7 +860,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
editKernelLocalversion "-dos.p806"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p861"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -388,6 +388,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52882/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52887/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0565/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch
@ -794,8 +795,61 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41022/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41040/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41064/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41065/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41070/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41078/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41090/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41091/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41092/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42076/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42093/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42120/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42121/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42124/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42127/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42152/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42161/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -804,7 +858,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
editKernelLocalversion "-dos.p804"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p859"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -352,11 +352,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p356"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p385"
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -374,6 +374,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -382,7 +406,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p382"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p407"
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -582,12 +582,50 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p587"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p625"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -459,6 +459,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -466,7 +477,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p466"
editKernelLocalversion "-dos.p477"
else echo "kernel_google_wahoo is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -442,11 +442,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p446"
editKernelLocalversion "-dos.p457"
else echo "kernel_lge_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -446,11 +446,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p450"
editKernelLocalversion "-dos.p461"
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -377,6 +377,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -385,7 +409,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p385"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p410"
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -434,12 +434,50 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p439"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p477"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1009,6 +1009,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1017,7 +1043,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p1017"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1044"
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -381,12 +381,50 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p386"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p424"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -113,6 +113,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52882/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52887/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0841/5.4/0004.patch
@ -442,8 +443,55 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41022/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41049/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41064/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41065/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41070/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41090/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41091/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42070/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42076/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42093/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42124/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42127/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
@ -453,7 +501,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
editKernelLocalversion "-dos.p453"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
editKernelLocalversion "-dos.p502"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -442,11 +442,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p446"
editKernelLocalversion "-dos.p457"
else echo "kernel_razer_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -373,6 +373,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -381,7 +405,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p381"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p406"
else echo "kernel_razer_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -993,6 +993,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
@ -1000,7 +1022,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p1000"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1023"
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -459,11 +459,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p463"
editKernelLocalversion "-dos.p474"
else echo "kernel_sony_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -859,6 +859,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -869,7 +891,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p869"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p892"
else echo "kernel_sony_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -374,6 +374,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -382,7 +406,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p382"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p407"
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -382,6 +382,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -390,7 +414,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p390"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p415"
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -387,11 +387,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p391"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p420"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -266,8 +266,47 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
editKernelLocalversion "-dos.p267"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p306"
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -389,11 +389,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p393"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p422"
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -457,12 +457,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p462"
editKernelLocalversion "-dos.p473"
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"