Update CVE patchers

Likely breakage

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-07-31 22:17:55 -04:00
parent 0c4b0672e4
commit 094b4f4f41
84 changed files with 1202 additions and 85 deletions

View file

@ -925,6 +925,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
@ -937,7 +940,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p937"
editKernelLocalversion "-dos.p940"
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -588,6 +588,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -596,7 +599,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p596"
editKernelLocalversion "-dos.p599"
else echo "kernel_asus_grouper is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -625,6 +625,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
@ -634,7 +637,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p634"
editKernelLocalversion "-dos.p637"
else echo "kernel_htc_msm8960 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -748,6 +748,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
@ -760,7 +768,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p760"
editKernelLocalversion "-dos.p768"
else echo "kernel_htc_msm8994 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -834,6 +834,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -845,7 +853,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p845"
editKernelLocalversion "-dos.p853"
else echo "kernel_lge_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -700,6 +700,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -709,7 +717,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p709"
editKernelLocalversion "-dos.p717"
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -700,6 +700,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
@ -709,7 +712,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p709"
editKernelLocalversion "-dos.p712"
else echo "kernel_samsung_d2 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -384,11 +384,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p388"
editKernelLocalversion "-dos.p391"
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -503,6 +503,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -510,7 +513,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p510"
editKernelLocalversion "-dos.p513"
else echo "kernel_samsung_manta is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -521,6 +521,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -529,7 +531,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p529"
editKernelLocalversion "-dos.p531"
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -513,6 +513,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -521,7 +523,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p521"
editKernelLocalversion "-dos.p523"
else echo "kernel_samsung_tuna is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -1032,6 +1032,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -1043,7 +1053,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1043"
editKernelLocalversion "-dos.p1053"
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -838,6 +838,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
@ -856,7 +864,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p856"
editKernelLocalversion "-dos.p864"
else echo "kernel_asus_fugu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -648,6 +648,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -658,7 +666,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p658"
editKernelLocalversion "-dos.p666"
else echo "kernel_asus_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -1000,6 +1000,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -1013,7 +1023,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1013"
editKernelLocalversion "-dos.p1023"
else echo "kernel_google_dragon is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -642,6 +642,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -653,7 +661,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p653"
editKernelLocalversion "-dos.p661"
else echo "kernel_htc_flounder is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -768,6 +768,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
@ -780,7 +788,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p780"
editKernelLocalversion "-dos.p788"
else echo "kernel_huawei_angler is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -779,6 +779,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
@ -791,7 +799,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p791"
editKernelLocalversion "-dos.p799"
else echo "kernel_lge_bullhead is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -990,6 +990,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -1000,7 +1010,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1000"
editKernelLocalversion "-dos.p1010"
else echo "kernel_zte_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -646,6 +646,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -656,7 +664,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p656"
editKernelLocalversion "-dos.p664"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -554,6 +554,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -561,7 +564,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p561"
editKernelLocalversion "-dos.p564"
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -693,6 +693,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -703,7 +710,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p703"
editKernelLocalversion "-dos.p710"
else echo "kernel_google_yellowstone is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -497,6 +497,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
@ -509,7 +517,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p509"
editKernelLocalversion "-dos.p517"
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -646,6 +646,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -656,7 +664,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p656"
editKernelLocalversion "-dos.p664"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -692,6 +692,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -701,7 +709,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p701"
editKernelLocalversion "-dos.p709"
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -614,6 +614,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -623,7 +631,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p623"
editKernelLocalversion "-dos.p631"
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -616,6 +616,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -625,7 +633,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p625"
editKernelLocalversion "-dos.p633"
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -963,13 +963,41 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p969"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p997"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -823,6 +823,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
@ -831,7 +841,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p831"
editKernelLocalversion "-dos.p841"
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -368,10 +368,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p371"
editKernelLocalversion "-dos.p374"
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -807,6 +807,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
@ -819,7 +829,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p819"
editKernelLocalversion "-dos.p829"
else echo "kernel_google_marlin is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -545,6 +545,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
@ -555,7 +558,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p555"
editKernelLocalversion "-dos.p558"
else echo "kernel_google_msm is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -655,6 +655,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -665,7 +668,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p665"
editKernelLocalversion "-dos.p668"
else echo "kernel_htc_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -582,6 +582,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -589,7 +592,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p589"
editKernelLocalversion "-dos.p592"
else echo "kernel_lge_g3 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -519,6 +519,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -527,7 +530,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p527"
editKernelLocalversion "-dos.p530"
else echo "kernel_lge_hammerhead is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -162,10 +162,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p165"
editKernelLocalversion "-dos.p168"
else echo "kernel_lge_mako is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -567,13 +567,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p573"
editKernelLocalversion "-dos.p576"
else echo "kernel_lge_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -532,6 +532,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
@ -545,7 +553,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p545"
editKernelLocalversion "-dos.p553"
else echo "kernel_moto_shamu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -636,6 +636,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -644,7 +647,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p644"
editKernelLocalversion "-dos.p647"
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -826,6 +826,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -835,7 +845,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p835"
editKernelLocalversion "-dos.p845"
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -666,6 +666,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -675,7 +683,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p675"
editKernelLocalversion "-dos.p683"
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -814,6 +814,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
@ -823,7 +833,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p823"
editKernelLocalversion "-dos.p833"
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -510,11 +510,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p514"
editKernelLocalversion "-dos.p517"
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -583,6 +583,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
@ -593,7 +596,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p593"
editKernelLocalversion "-dos.p596"
else echo "kernel_samsung_jf is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -665,6 +665,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -677,7 +680,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p677"
editKernelLocalversion "-dos.p680"
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -396,10 +396,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40968/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40981/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p399"
editKernelLocalversion "-dos.p402"
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -465,11 +465,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40988/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p469"
editKernelLocalversion "-dos.p479"
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -1042,6 +1042,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1051,7 +1077,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p1051"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1078"
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -491,6 +491,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -498,7 +509,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p498"
editKernelLocalversion "-dos.p509"
else echo "kernel_essential_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -375,6 +375,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -383,7 +407,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p383"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p408"
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -383,12 +383,50 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p388"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p426"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -442,11 +442,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p446"
editKernelLocalversion "-dos.p457"
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -383,12 +383,50 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p388"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p426"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -390,6 +390,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52882/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52887/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0565/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch
@ -796,8 +797,61 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41022/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41040/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41064/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41065/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41070/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41078/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41090/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41091/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41092/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42076/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42093/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42120/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42121/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42124/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42127/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42152/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42161/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -806,7 +860,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
editKernelLocalversion "-dos.p806"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p861"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -388,6 +388,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52882/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52887/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0565/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch
@ -794,8 +795,61 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41022/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41040/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41064/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41065/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41070/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41078/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41090/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41091/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41092/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42076/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42093/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42120/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42121/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42124/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42127/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42152/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42161/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42229/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -804,7 +858,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
editKernelLocalversion "-dos.p804"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p859"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -352,11 +352,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p356"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p385"
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -374,6 +374,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -382,7 +406,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p382"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p407"
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -582,12 +582,50 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p587"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p625"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -459,6 +459,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -466,7 +477,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p466"
editKernelLocalversion "-dos.p477"
else echo "kernel_google_wahoo is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -442,11 +442,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p446"
editKernelLocalversion "-dos.p457"
else echo "kernel_lge_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -446,11 +446,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p450"
editKernelLocalversion "-dos.p461"
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -377,6 +377,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -385,7 +409,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p385"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p410"
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -434,12 +434,50 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p439"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p477"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -1009,6 +1009,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1017,7 +1043,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p1017"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1044"
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -381,12 +381,50 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p386"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p424"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -113,6 +113,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52882/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52887/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0841/5.4/0004.patch
@ -442,8 +443,55 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41022/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41049/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41064/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41065/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41070/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41090/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41091/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42070/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42076/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42093/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42124/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42127/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
@ -453,7 +501,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
editKernelLocalversion "-dos.p453"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
editKernelLocalversion "-dos.p502"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -442,11 +442,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p446"
editKernelLocalversion "-dos.p457"
else echo "kernel_razer_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -373,6 +373,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -381,7 +405,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p381"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p406"
else echo "kernel_razer_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -993,6 +993,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
@ -1000,7 +1022,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p1000"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1023"
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -459,11 +459,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p463"
editKernelLocalversion "-dos.p474"
else echo "kernel_sony_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -859,6 +859,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -869,7 +891,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p869"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p892"
else echo "kernel_sony_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -374,6 +374,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -382,7 +406,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p382"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p407"
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -382,6 +382,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -390,7 +414,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p390"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p415"
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -387,11 +387,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p391"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p420"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -266,8 +266,47 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41023/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42084/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42086/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42087/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42092/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
editKernelLocalversion "-dos.p267"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p306"
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -389,11 +389,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41081/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41097/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42077/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
editKernelLocalversion "-dos.p393"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p422"
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -457,12 +457,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40996/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41014/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41072/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41089/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41095/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p462"
editKernelLocalversion "-dos.p473"
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"