diff --git a/Patches/Linux b/Patches/Linux index fa819a2a..d3f8c0a6 160000 --- a/Patches/Linux +++ b/Patches/Linux @@ -1 +1 @@ -Subproject commit fa819a2a0409159967934526c438774e6f72df4e +Subproject commit d3f8c0a65ddd03e810498429022ccf24bceb9c10 diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh index 33e0bcda..8f934282 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh @@ -710,7 +710,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch @@ -729,7 +729,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch @@ -740,7 +740,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh index ea62bd56..7e1a5a48 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh @@ -670,7 +670,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch @@ -689,7 +689,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch @@ -701,7 +701,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0003-tunnels-Don-t-apply-GRO-to-multiple-layers-of-encaps.patch diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8996.sh index b77069f3..bdd0a2be 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8996.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8996.sh @@ -560,7 +560,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch @@ -582,7 +582,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch @@ -593,7 +593,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh index cdeb59c5..f12648c6 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh @@ -650,7 +650,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch @@ -673,7 +673,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch @@ -684,7 +684,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh index 679275f8..8ed7248b 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh @@ -417,7 +417,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch @@ -445,7 +445,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch @@ -456,7 +456,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8996.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8996.sh index c954fbf1..56703fad 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8996.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8996.sh @@ -568,7 +568,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch @@ -592,7 +592,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch @@ -603,7 +603,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh index 2faaef10..c674ca9e 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh @@ -561,6 +561,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.19/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch @@ -568,5 +569,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch -editKernelLocalversion "-dos.p568" +editKernelLocalversion "-dos.p569" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_samsung_universal9810.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_samsung_universal9810.sh index 0a5aa301..e4f74d06 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_samsung_universal9810.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_samsung_universal9810.sh @@ -41,14 +41,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3575/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13917/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch @@ -72,8 +74,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/^5.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch @@ -123,7 +125,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch @@ -229,6 +231,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0013.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.9/0005.patch @@ -280,7 +283,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch @@ -295,11 +298,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0014.patch @@ -332,7 +335,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1729/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1734/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1836/4.9/0005.patch @@ -350,7 +353,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch @@ -373,9 +376,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20566/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch @@ -389,13 +393,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch @@ -409,10 +414,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch -editKernelLocalversion "-dos.p414" +editKernelLocalversion "-dos.p419" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh index 51e5510a..623ba01f 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh @@ -351,7 +351,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch @@ -383,7 +383,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch @@ -397,7 +397,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh index 3982220f..ff5e83ff 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh @@ -463,7 +463,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch @@ -489,7 +489,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch @@ -501,7 +501,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8996.sh index 8c386465..d2eeaa17 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8996.sh @@ -547,7 +547,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch @@ -570,7 +570,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch @@ -581,7 +581,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh index 0d69b313..6ec809d0 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh @@ -464,7 +464,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch @@ -491,7 +491,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.9/0004.patch @@ -502,7 +502,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh index c9fe9bee..d7b5ed77 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh @@ -80,7 +80,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch @@ -118,7 +118,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch @@ -132,7 +132,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch editKernelLocalversion "-dos.p134" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_zuk_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_zuk_msm8996.sh index e738ce4e..d696e950 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_zuk_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_zuk_msm8996.sh @@ -341,7 +341,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch @@ -379,7 +379,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch @@ -393,7 +393,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_essential_msm8998.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_essential_msm8998.sh index afba2b6d..c00cd79a 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_essential_msm8998.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_essential_msm8998.sh @@ -130,7 +130,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch @@ -157,7 +157,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch @@ -171,6 +171,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch editKernelLocalversion "-dos.p172" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh index 703479b6..2ec16a0e 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh @@ -45,7 +45,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch @@ -55,23 +57,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.9/0004.patch @@ -80,13 +88,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3643/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch -editKernelLocalversion "-dos.p88" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch +editKernelLocalversion "-dos.p98" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_msm8998.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_msm8998.sh index 28ade842..b3acee38 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_msm8998.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_msm8998.sh @@ -81,7 +81,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch @@ -119,7 +119,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch @@ -133,7 +133,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0002.patch editKernelLocalversion "-dos.p136" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh index ca125154..cf6e3781 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh @@ -85,7 +85,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch @@ -123,7 +123,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch @@ -137,7 +137,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0002.patch editKernelLocalversion "-dos.p140" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh index 43884c8e..c7256cf2 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh @@ -504,6 +504,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch @@ -511,5 +512,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22095/ANY/0001.patch -editKernelLocalversion "-dos.p511" +editKernelLocalversion "-dos.p512" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh index f9c93af1..03eac9a9 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh @@ -72,5 +72,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41218/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch -editKernelLocalversion "-dos.p72" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch +editKernelLocalversion "-dos.p73" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh index fb875921..5185ec3c 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh @@ -82,7 +82,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch @@ -116,7 +116,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch @@ -130,6 +130,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch editKernelLocalversion "-dos.p131" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh index c0c9a3dc..1557713d 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh @@ -111,6 +111,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4095/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/5.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/5.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4696/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-21505/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/5.10/0005.patch @@ -152,5 +153,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47520/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47521/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47946/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/ANY/0009.patch -editKernelLocalversion "-dos.p152" +editKernelLocalversion "-dos.p153" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh index f9037eeb..f091bc44 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh @@ -111,6 +111,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4095/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/5.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/5.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4696/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-21505/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/5.10/0005.patch @@ -152,5 +153,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47520/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47521/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47946/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/ANY/0009.patch -editKernelLocalversion "-dos.p152" +editKernelLocalversion "-dos.p153" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh index 8aad2eed..f95a3d5c 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh @@ -46,7 +46,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9462/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9519/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch @@ -58,25 +60,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25664/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25715/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25722/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch -editKernelLocalversion "-dos.p78" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch +editKernelLocalversion "-dos.p88" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh index 14b9f76d..3edda934 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh @@ -116,5 +116,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch -editKernelLocalversion "-dos.p116" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch +editKernelLocalversion "-dos.p117" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh index 3db1a91a..972d7641 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh @@ -102,7 +102,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch @@ -129,7 +129,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch @@ -143,6 +143,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch editKernelLocalversion "-dos.p144" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh index fe4af80a..093644a5 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh @@ -83,7 +83,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.9/0004.patch @@ -111,7 +111,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch @@ -125,6 +125,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch editKernelLocalversion "-dos.p126" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh index 55625212..dcaa638d 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh @@ -52,12 +52,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch @@ -78,7 +80,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch @@ -114,7 +116,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch @@ -195,6 +197,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0013.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.9/0005.patch @@ -246,7 +249,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch @@ -262,11 +265,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0013.patch @@ -298,7 +301,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1729/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1734/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1836/4.9/0005.patch @@ -316,7 +319,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch @@ -339,9 +342,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20566/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch @@ -357,13 +361,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch @@ -377,8 +382,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch -editKernelLocalversion "-dos.p380" +editKernelLocalversion "-dos.p385" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh index 08ffb96a..536ba24e 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh @@ -71,5 +71,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41218/^6.1/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch -editKernelLocalversion "-dos.p71" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch +editKernelLocalversion "-dos.p72" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh index dfe9f465..78de86b8 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh @@ -41,7 +41,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch @@ -53,23 +55,31 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35119/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25715/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25722/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch -editKernelLocalversion "-dos.p71" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch +editKernelLocalversion "-dos.p81" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh index c2eaa90b..5fe0d95e 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh @@ -50,13 +50,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.9/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2284/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10565/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch @@ -78,7 +80,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch @@ -115,7 +117,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch @@ -198,6 +200,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0013.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.9/0005.patch @@ -249,7 +252,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch @@ -266,11 +269,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/4.14/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0013.patch @@ -302,7 +305,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1729/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1734/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1836/4.9/0005.patch @@ -320,7 +323,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2991/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3521/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch @@ -343,9 +346,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20566/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch @@ -361,13 +365,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.9/0005.patch @@ -381,8 +386,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch -editKernelLocalversion "-dos.p384" +editKernelLocalversion "-dos.p389" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh index 35de1bc3..c740ae84 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh @@ -41,7 +41,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11412/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch @@ -51,24 +53,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35119/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25715/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25722/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -editKernelLocalversion "-dos.p70" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch +editKernelLocalversion "-dos.p80" cd "$DOS_BUILD_BASE"