Update CVE patchers

untested, maybe breakage

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-10-29 10:18:21 -04:00
parent 2a4fac087d
commit 11f1a8ca6d
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
19 changed files with 274 additions and 228 deletions

@ -1 +1 @@
Subproject commit 49d2063017a55861e9b04234149ccab344551cb2
Subproject commit a1d92a83709dea57df2ecab9c39d811abb708472

@ -1 +1 @@
Subproject commit ea2d5e50d9f659861c42ef36c104311214a9925e
Subproject commit 0a3123a39c9e89fd4915fa9f1111db4589984e33

View File

@ -151,6 +151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3744/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3759/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0009.patch
@ -220,9 +221,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch
@ -728,6 +729,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6040/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6915/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6932/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.14/0005.patch
@ -745,7 +747,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28554/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
@ -779,7 +781,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52439/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/4.14/0008.patch
@ -860,7 +862,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52915/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
@ -1107,6 +1109,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.14/0009.patch
@ -1122,32 +1125,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44952/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -1211,7 +1215,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1211"
editKernelLocalversion "-dos.p1215"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -247,6 +247,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3744/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3759/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0009.patch
@ -317,9 +318,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch
@ -808,6 +809,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6040/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6915/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6932/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.14/0004.patch
@ -827,7 +829,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28571/qcacld-3.0/0001.patch --directo
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28584/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
@ -864,7 +866,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
@ -941,7 +943,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52915/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
@ -1187,6 +1189,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.14/0009.patch
@ -1203,7 +1206,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-prereq/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
@ -1211,25 +1214,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44952/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -1298,7 +1302,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p1298"
editKernelLocalversion "-dos.p1302"
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -59,7 +59,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
@ -144,7 +144,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
@ -173,7 +173,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.14/0009.patch
@ -231,7 +231,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
@ -452,22 +452,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46675/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -528,7 +530,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-alt/4.9/0001.patch
editKernelLocalversion "-dos.p528"
editKernelLocalversion "-dos.p530"
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1195,6 +1195,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50046/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50049/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50059/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50074/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50082/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50083/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch
@ -1206,7 +1209,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49881/5.10/0002.patch
editKernelLocalversion "-dos.p1206"
editKernelLocalversion "-dos.p1209"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1193,6 +1193,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50046/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50049/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50059/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50074/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50082/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50083/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch
@ -1204,7 +1207,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49881/5.10/0002.patch
editKernelLocalversion "-dos.p1204"
editKernelLocalversion "-dos.p1207"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -67,11 +67,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3759/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46921/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46958/^5.12/0001.patch
@ -111,10 +112,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6040/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6915/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28554/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33064/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33065/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33070/ANY/0001.patch
@ -125,7 +127,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51043/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52439/4.14/0008.patch
@ -171,7 +173,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52847/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.14/0009.patch
@ -435,6 +437,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
@ -454,7 +457,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-prereq/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
@ -462,28 +465,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44952/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -552,7 +556,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p552"
editKernelLocalversion "-dos.p556"
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -72,7 +72,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/4.19/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46909/4.14/0002.patch
@ -156,7 +156,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
@ -182,7 +182,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.14/0009.patch
@ -240,7 +240,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
@ -458,22 +458,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46675/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -534,7 +536,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p534"
editKernelLocalversion "-dos.p536"
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -63,7 +63,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35119/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch
@ -151,7 +151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
@ -178,7 +178,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.14/0009.patch
@ -236,7 +236,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
@ -464,22 +464,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46675/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -542,7 +544,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p542"
editKernelLocalversion "-dos.p544"
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -225,6 +225,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3744/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3759/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0009.patch
@ -291,9 +292,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0013.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch
@ -764,6 +765,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6040/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6915/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6932/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.14/0004.patch
@ -783,7 +785,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28571/qcacld-3.0/0001.patch --directo
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28584/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
@ -820,7 +822,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52443/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/^6.7/0001.patch
@ -897,7 +899,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52915/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
@ -1142,6 +1144,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.14/0009.patch
@ -1158,7 +1161,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-prereq/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
@ -1166,25 +1169,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44952/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -1252,7 +1256,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p1252"
editKernelLocalversion "-dos.p1256"
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -703,6 +703,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50059/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50082/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
@ -714,7 +715,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
editKernelLocalversion "-dos.p714"
editKernelLocalversion "-dos.p715"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -63,7 +63,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35119/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch
@ -150,7 +150,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
@ -176,7 +176,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.14/0009.patch
@ -234,7 +234,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
@ -460,22 +460,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46675/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -538,7 +540,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p538"
editKernelLocalversion "-dos.p540"
else echo "kernel_razer_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -445,7 +445,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch
@ -817,7 +817,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28772/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
@ -837,7 +837,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.14/0009.patch
@ -890,7 +890,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
@ -1087,19 +1087,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.19/0002.patch
@ -1153,7 +1154,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1153"
editKernelLocalversion "-dos.p1154"
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -264,7 +264,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch
@ -687,7 +687,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28584/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28772/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
@ -717,7 +717,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.14/0009.patch
@ -770,7 +770,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
@ -979,20 +979,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46675/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.19/0002.patch
@ -1056,7 +1058,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p1056"
editKernelLocalversion "-dos.p1058"
else echo "kernel_sony_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -57,7 +57,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46909/4.14/0002.patch
@ -142,7 +142,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22387/ANY/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
@ -174,7 +174,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.14/0009.patch
@ -232,7 +232,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
@ -454,22 +454,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46675/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -531,7 +533,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p531"
editKernelLocalversion "-dos.p533"
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -64,7 +64,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35119/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch
@ -154,7 +154,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28584/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.14/0003.patch
@ -185,7 +185,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51780/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51781/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51782/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52444/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52445/4.14/0009.patch
@ -243,7 +243,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.14/0003.patch
@ -469,22 +469,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46675/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -545,7 +547,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p545"
editKernelLocalversion "-dos.p547"
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -68,11 +68,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3759/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46921/4.19/0002.patch
@ -120,11 +121,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6040/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6915/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6932/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-25775/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33114/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-43545/qcacld-3.0/0001.patch --directory=drivers/staging/qcacld-3.0
@ -134,7 +136,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51043/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52439/4.14/0008.patch
@ -201,7 +203,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52867/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52875/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.14/0009.patch
@ -470,6 +472,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
@ -490,7 +493,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-prereq/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
@ -498,28 +501,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44952/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -590,7 +594,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p590"
editKernelLocalversion "-dos.p594"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -66,11 +66,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3759/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/4.14/0018.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33655/4.14/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46912/^5.12/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46921/4.19/0002.patch
@ -118,11 +119,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6040/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6915/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6932/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-25775/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33031/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33114/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch
@ -135,7 +137,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-46838/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-47233/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-51043/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52429/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52435/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52436/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52439/4.14/0008.patch
@ -207,7 +209,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52867/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52875/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52918/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.14/0009.patch
@ -474,6 +476,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
@ -494,7 +497,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-prereq/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.14/0009.patch
@ -502,28 +505,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44946/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44952/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44954/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.19/0002.patch
@ -594,7 +598,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p594"
editKernelLocalversion "-dos.p598"
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"