From 39a015c55a036f45ce858b1d1865f8be13e09f69 Mon Sep 17 00:00:00 2001 From: Tavi Date: Mon, 17 Jun 2024 02:18:04 -0400 Subject: [PATCH] Fixups + Churn Signed-off-by: Tavi --- Logs/resetWorkspace-LineageOS-18.1.txt | 4 +-- Logs/resetWorkspace-LineageOS-19.1.txt | 8 +++--- .../0013-Network_Permission-1.patch | 4 +-- .../0013-Sensors_Permission.patch | 4 +-- .../0013-Special_Permissions.patch | 16 ++++++------ .../android_frameworks_base/394553.patch | 6 ++--- .../android_frameworks_base/394554.patch | 6 ++--- .../android_frameworks_base/394555.patch | 12 ++++----- .../android_frameworks_base/394556.patch | 26 +++++++++---------- .../android_frameworks_base/394557.patch | 10 +++---- .../android_frameworks_base/394558.patch | 6 ++--- .../android_frameworks_base/394559.patch | 8 +++--- .../android_frameworks_base/394560.patch | 8 +++--- .../android_frameworks_base/394561.patch | 8 +++--- .../android_frameworks_base/394562.patch | 8 +++--- .../android_frameworks_base/394563.patch | 10 +++---- .../330099.patch | 6 ++--- .../0013-Network_Permission-1.patch | 4 +-- .../0013-Sensors_Permission.patch | 4 +-- .../0013-Special_Permissions-2.patch | 12 ++++----- .../0013-Special_Permissions.patch | 16 ++++++------ .../0002-Tor_Support.patch | 6 ++--- .../0003-Server_Choices.patch | 6 ++--- Scripts/Common/Fix_CVE_Patchers.sh | 2 +- .../android_kernel_samsung_universal8890.sh | 2 +- .../android_kernel_google_dragon.sh | 2 +- .../android_kernel_zte_msm8996.sh | 2 +- .../android_kernel_google_marlin.sh | 4 +-- .../android_kernel_motorola_msm8996.sh | 4 +-- .../android_kernel_oneplus_msm8996.sh | 4 +-- 30 files changed, 109 insertions(+), 109 deletions(-) diff --git a/Logs/resetWorkspace-LineageOS-18.1.txt b/Logs/resetWorkspace-LineageOS-18.1.txt index 95c1b522..5d6ac93e 100644 --- a/Logs/resetWorkspace-LineageOS-18.1.txt +++ b/Logs/resetWorkspace-LineageOS-18.1.txt @@ -135,7 +135,7 @@ external/cblas d82c5f4ae14b2a5468303985070f7dadc15d4094 external/cbor-java f81e576298790c97498311e99a0b0b34653c3dd8 external/chromium-libpac 169c93e00a00605346a68d39d3f4713735bdb61e external/chromium-trace e524766cad26d677a9a1ec8c00c512d4cac2cf5e -external/chromium-webview 18024297bc95fb233a92b15d8bf26c9b987bda66 +external/chromium-webview b796168b7ca30f621e1c85271044bd56d74bde23 external/clang 0a1c53a5d295109bd4702ad13c0f2a5510ca1b26 external/cldr 38850463abd624d5b2293be75fddc43cf6b55ae2 external/cn-cbor 696530332036f5518681d3c450cdbc3ee412004a @@ -858,7 +858,7 @@ tools/loganalysis 915dbf1d7ed0f684d2d1bc3a6be9ef417c93527d tools/metalava 21659a2683eed66e16aeafeb8d9c40916946a51b tools/ndkports d0ec81e4b134f4b1446d3fd5a6dfbf095475597c tools/platform-compat b553fea7dd2aa8dcc26f4d8f91effd86e55dd72e -tools/repohooks 6ca9412c1ba65e255924a403165d60949bfebd50 +tools/repohooks eee438b68bc9c55036016d681269ee8c261c94ff tools/security a5c3644bd83674858e0b9d5da3e6014a3cbf3ba6 tools/test/connectivity 38ccb70b61038b0be21da87ae626b01a3d162bf8 tools/test/graphicsbenchmark 7c31a9c1f32d602e1b50446951088d3beddedb84 diff --git a/Logs/resetWorkspace-LineageOS-19.1.txt b/Logs/resetWorkspace-LineageOS-19.1.txt index d1bb3070..18036aa2 100644 --- a/Logs/resetWorkspace-LineageOS-19.1.txt +++ b/Logs/resetWorkspace-LineageOS-19.1.txt @@ -5,7 +5,7 @@ bootable/libbootloader b44eeefd365e023a96ea36682cc60b46827a47cc bootable/recovery 7c1eb300fbcf789024da690c96adb167d31aa5a5 build/bazel f3015c3bbd520d95216123e6761a2860e17acebf build/blueprint c24408d5ae37cbcbec15205a02812b7d6c563b90 -build/make b7fd9639201c3842d7e0d91e4c303dc92df6fe4f +build/make 722c54d2ddc48d914e10769348ae4381b4f47427 build/pesto 0f35caa8191635ace102f6d8c96318c5ed52dfe3 build/soong 59d5b37cce358e0d300392676d64191d3938608f compatibility/cdd 43611a0b6d2c62ae1d08d951fccf8f2ab8dc60c6 @@ -94,7 +94,7 @@ external/catch2 2b2e0e9540defee10f28ea0fc97750490fa238b5 external/cblas 2b24922070cb6d45edd5f5b533db0637099a2b17 external/cbor-java 00c4a382dd3810f9c1b363eaad339cff34a3f6fe external/chromium-trace 138ade68f9d3388a1b0a6d9ce5e091ff6f7e7448 -external/chromium-webview 18024297bc95fb233a92b15d8bf26c9b987bda66 +external/chromium-webview b796168b7ca30f621e1c85271044bd56d74bde23 external/clang f1cef8e77ae220c9379303bdc9896e0c2366bd6f external/cldr 242ecd0dcb21f3376f825119ec0b36fcb15e7bb8 external/cn-cbor 6a0f6a5375b8cd9b495e91c11d21ed257ec9a905 @@ -875,7 +875,7 @@ packages/apps/Traceur b5e983189ce82742037f76e3ae1340e4cb74d80e packages/apps/Trebuchet 660a409e818d44701af28669cc2e42acb316d267 packages/apps/TvSettings f8fb67eccca677e57c96a872c032c131b04d0409 packages/apps/UniversalMediaPlayer 3a912bc775d662a075ed7c8d278e77d780c57213 -packages/apps/Updater fbeda0aa43cd7053a2dcab70a9dc964ad135cd3d +packages/apps/Updater 1546e90f1a619a39b384267d845a0b57d42e9c50 packages/apps/WallpaperPicker2 ee2174f46338aca760e6ce61235cca191619be74 packages/inputmethods/LatinIME 59669cfd005f1827c8096c6ac60a7df28af1cd31 packages/inputmethods/LeanbackIME 3aa34644aff68909411087d79e4fc07406be6ca5 @@ -1082,7 +1082,7 @@ tools/extract-utils c12d3941893a6d1187986d85be04308104d13269 tools/metalava 0d8be7040dceaf9b084e909b6907e463ab7d3237 tools/ndkports a181fe59a34803a1ba7300bd1a32532b6dc3e9fb tools/platform-compat cfa5a189e9671992ba7ad5b8de5d59826544a592 -tools/repohooks 6ca9412c1ba65e255924a403165d60949bfebd50 +tools/repohooks eee438b68bc9c55036016d681269ee8c261c94ff tools/security 4af6777ed4b7a9c09508a600349e0e548174361f tools/test/connectivity a74e9d3afee07e92cc9f74345f91ea7cbe29d44d tools/test/graphicsbenchmark 6404f16911f96d9253847c1390fd81f1923954cd diff --git a/Patches/LineageOS-18.1/android_frameworks_base/0013-Network_Permission-1.patch b/Patches/LineageOS-18.1/android_frameworks_base/0013-Network_Permission-1.patch index 0458e0e5..a563d5d7 100644 --- a/Patches/LineageOS-18.1/android_frameworks_base/0013-Network_Permission-1.patch +++ b/Patches/LineageOS-18.1/android_frameworks_base/0013-Network_Permission-1.patch @@ -23,10 +23,10 @@ index eb64db7493cc..31b960716b4b 100644 diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java -index 6686d3750b84..961d7f050e5d 100644 +index 1aa703adee58..b4240a3a944e 100644 --- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java +++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java -@@ -2632,7 +2632,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -2633,7 +2633,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { } public static boolean isSpecialRuntimePermission(final String permission) { diff --git a/Patches/LineageOS-19.1/android_frameworks_base/0013-Special_Permissions-2.patch b/Patches/LineageOS-19.1/android_frameworks_base/0013-Special_Permissions-2.patch index 155400ef..91147bbf 100644 --- a/Patches/LineageOS-19.1/android_frameworks_base/0013-Special_Permissions-2.patch +++ b/Patches/LineageOS-19.1/android_frameworks_base/0013-Special_Permissions-2.patch @@ -8,10 +8,10 @@ Subject: [PATCH] extend special runtime permission implementation 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java -index e4653a899ddd..ff97a3b2e4a8 100644 +index 917a32193409..fb0167d80fda 100644 --- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java +++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java -@@ -1881,7 +1881,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -1882,7 +1882,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { // permission as requiring a review as this is the initial state. final int uid = mPackageManagerInt.getPackageUid(packageName, 0, userId); final int targetSdk = mPackageManagerInt.getUidTargetSdkVersion(uid); @@ -20,7 +20,7 @@ index e4653a899ddd..ff97a3b2e4a8 100644 ? FLAG_PERMISSION_REVIEW_REQUIRED | FLAG_PERMISSION_REVOKED_COMPAT : 0; -@@ -2765,7 +2765,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -2766,7 +2766,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { FLAG_PERMISSION_RESTRICTION_UPGRADE_EXEMPT, FLAG_PERMISSION_RESTRICTION_UPGRADE_EXEMPT); } @@ -29,7 +29,7 @@ index e4653a899ddd..ff97a3b2e4a8 100644 uidState.updatePermissionFlags(permission, PackageManager.FLAG_PERMISSION_REVIEW_REQUIRED | PackageManager.FLAG_PERMISSION_REVOKED_COMPAT, -@@ -2855,7 +2855,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -2856,7 +2856,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { // continue; // } @@ -38,7 +38,7 @@ index e4653a899ddd..ff97a3b2e4a8 100644 if (DEBUG_PERMISSIONS) { Log.i(TAG, "Denying runtime-only permission " + bp.getName() + " for package " + friendlyName); -@@ -2960,7 +2960,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -2961,7 +2961,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { boolean restrictionApplied = (origState.getPermissionFlags( bp.getName()) & FLAG_PERMISSION_APPLY_RESTRICTION) != 0; @@ -47,7 +47,7 @@ index e4653a899ddd..ff97a3b2e4a8 100644 // If hard restricted we don't allow holding it if (permissionPolicyInitialized && hardRestricted) { if (!restrictionExempt) { -@@ -3044,7 +3044,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -3045,7 +3045,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { if (restrictionApplied) { flags &= ~FLAG_PERMISSION_APPLY_RESTRICTION; // Dropping restriction on a legacy app implies a review diff --git a/Patches/LineageOS-19.1/android_frameworks_base/0013-Special_Permissions.patch b/Patches/LineageOS-19.1/android_frameworks_base/0013-Special_Permissions.patch index 4010e176..7a0c3d68 100644 --- a/Patches/LineageOS-19.1/android_frameworks_base/0013-Special_Permissions.patch +++ b/Patches/LineageOS-19.1/android_frameworks_base/0013-Special_Permissions.patch @@ -20,10 +20,10 @@ Signed-off-by: Danny Lin 1 file changed, 20 insertions(+), 5 deletions(-) diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java -index dd8b96eab3d7..e4653a899ddd 100644 +index 31babe0418b8..917a32193409 100644 --- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java +++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java -@@ -1525,7 +1525,8 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -1526,7 +1526,8 @@ public class PermissionManagerService extends IPermissionManager.Stub { // their permissions as always granted runtime ones since we need // to keep the review required permission flag per user while an // install permission's state is shared across all users. @@ -33,7 +33,7 @@ index dd8b96eab3d7..e4653a899ddd 100644 return; } -@@ -1568,7 +1569,8 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -1569,7 +1570,8 @@ public class PermissionManagerService extends IPermissionManager.Stub { + " for package " + packageName); } @@ -43,7 +43,7 @@ index dd8b96eab3d7..e4653a899ddd 100644 Slog.w(TAG, "Cannot grant runtime permission to a legacy app"); return; } -@@ -1693,7 +1695,8 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -1694,7 +1696,8 @@ public class PermissionManagerService extends IPermissionManager.Stub { // their permissions as always granted runtime ones since we need // to keep the review required permission flag per user while an // install permission's state is shared across all users. @@ -53,7 +53,7 @@ index dd8b96eab3d7..e4653a899ddd 100644 return; } -@@ -1898,7 +1901,8 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -1899,7 +1902,8 @@ public class PermissionManagerService extends IPermissionManager.Stub { // If this permission was granted by default or role, make sure it is. if ((oldFlags & FLAG_PERMISSION_GRANTED_BY_DEFAULT) != 0 @@ -63,7 +63,7 @@ index dd8b96eab3d7..e4653a899ddd 100644 // PermissionPolicyService will handle the app op for runtime permissions later. grantRuntimePermissionInternal(packageName, permName, false, Process.SYSTEM_UID, userId, delayingPermCallback); -@@ -2627,6 +2631,10 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -2628,6 +2632,10 @@ public class PermissionManagerService extends IPermissionManager.Stub { } } @@ -74,7 +74,7 @@ index dd8b96eab3d7..e4653a899ddd 100644 /** * Restore the permission state for a package. * -@@ -2995,6 +3003,13 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -2996,6 +3004,13 @@ public class PermissionManagerService extends IPermissionManager.Stub { } } } @@ -88,7 +88,7 @@ index dd8b96eab3d7..e4653a899ddd 100644 } else { if (origPermState == null) { // New permission -@@ -3818,7 +3833,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { +@@ -3819,7 +3834,7 @@ public class PermissionManagerService extends IPermissionManager.Stub { if (shouldGrantPermission) { final int flags = getPermissionFlagsInternal(pkg.getPackageName(), permission, myUid, userId); diff --git a/Patches/LineageOS-19.1/android_packages_apps_Updater/0002-Tor_Support.patch b/Patches/LineageOS-19.1/android_packages_apps_Updater/0002-Tor_Support.patch index 0990ef3b..4612fc2b 100644 --- a/Patches/LineageOS-19.1/android_packages_apps_Updater/0002-Tor_Support.patch +++ b/Patches/LineageOS-19.1/android_packages_apps_Updater/0002-Tor_Support.patch @@ -52,10 +52,10 @@ index c586f44..b1536ea 100644 android:id="@+id/preferences_auto_delete_updates" android:layout_width="match_parent" diff --git a/res/values/strings.xml b/res/values/strings.xml -index bfb2627..916e1e6 100644 +index 1bf6259..81070f8 100644 --- a/res/values/strings.xml +++ b/res/values/strings.xml -@@ -70,6 +70,7 @@ +@@ -79,6 +79,7 @@ Once a week Once a month Never @@ -63,7 +63,7 @@ index bfb2627..916e1e6 100644 Delete updates when installed Delete Copy URL -@@ -87,6 +88,7 @@ +@@ -96,6 +97,7 @@ The download failed. Please check your internet connection and try again later. The update verification failed. Download completed. diff --git a/Patches/LineageOS-19.1/android_packages_apps_Updater/0003-Server_Choices.patch b/Patches/LineageOS-19.1/android_packages_apps_Updater/0003-Server_Choices.patch index 5fb30ffe..cdcac232 100644 --- a/Patches/LineageOS-19.1/android_packages_apps_Updater/0003-Server_Choices.patch +++ b/Patches/LineageOS-19.1/android_packages_apps_Updater/0003-Server_Choices.patch @@ -81,10 +81,10 @@ index 287c221..777c8ef 100644 + diff --git a/res/values/strings.xml b/res/values/strings.xml -index 916e1e6..73f3979 100644 +index 81070f8..fc690f6 100644 --- a/res/values/strings.xml +++ b/res/values/strings.xml -@@ -70,6 +70,11 @@ +@@ -79,6 +79,11 @@ Once a week Once a month Never @@ -164,7 +164,7 @@ index 37e81d8..d6f22d2 100644 public static final String PREF_AUTO_DELETE_UPDATES = "auto_delete_updates"; public static final String PREF_AB_PERF_MODE = "ab_perf_mode"; diff --git a/src/org/lineageos/updater/misc/Utils.java b/src/org/lineageos/updater/misc/Utils.java -index 2b42726..7ba5f48 100644 +index 2b42726..1577b3d 100644 --- a/src/org/lineageos/updater/misc/Utils.java +++ b/src/org/lineageos/updater/misc/Utils.java @@ -210,14 +210,33 @@ public class Utils { diff --git a/Scripts/Common/Fix_CVE_Patchers.sh b/Scripts/Common/Fix_CVE_Patchers.sh index 8f80bcbc..2c6c51bd 100644 --- a/Scripts/Common/Fix_CVE_Patchers.sh +++ b/Scripts/Common/Fix_CVE_Patchers.sh @@ -136,7 +136,7 @@ done declare -a threeDotEighteen=("${threeDotTen[@]}" "android_kernel_samsung_universal8890.sh" "android_kernel_google_dragon.sh" "android_kernel_zte_msm8996.sh" "android_kernel_asus_msm8953.sh" "android_kernel_google_marlin.sh" "android_kernel_motorola_msm8996.sh" "android_kernel_oneplus_msm8996.sh"); for script in "${threeDotEighteen[@]}" do - commentPatches $script "0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch" "CVE-2018-16597/4.4" "CVE-2019-19319/4.4" "CVE-2020-0305/4.4" "CVE-2020-0429/4.4" "CVE-2020-8992/4.4" "CVE-2021-1048/4.4" "CVE-2021-3428/4.4" "CVE-2021-20265/4.4" "CVE-2021-47277" "CVE-2021-47320" "CVE-2022-1184/4.4/0014.patch" "CVE-2022-1184/4.9/0007.patch" "CVE-2022-40768/4.9/0007.patch" "CVE-2022-40768/4.4/0008.patch" "CVE-2022-47929/4.4" "CVE-2023-0458" "CVE-2024-26889"; + commentPatches $script "0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch" "CVE-2018-16597/4.4" "CVE-2019-19319/4.4" "CVE-2020-0305/4.4" "CVE-2020-0429/4.4" "CVE-2020-8992/4.4" "CVE-2021-1048/4.4" "CVE-2021-3428/4.4" "CVE-2021-20265/4.4" "CVE-2021-47277" "CVE-2021-47320" "CVE-2022-1184/4.4/0014.patch" "CVE-2022-1184/4.9/0007.patch" "CVE-2022-40768/4.9/0007.patch" "CVE-2022-40768/4.4/0008.patch" "CVE-2022-47929/4.4" "CVE-2023-0458" "CVE-2024-26889" "CVE-2024-35954/^6.9" "CVE-2021-47495/4.4"; done #4.4 diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh index 965c3044..90f5aa7a 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh @@ -771,7 +771,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47476/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47478/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47499/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47518/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh index 7c2736b8..7670e297 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh @@ -730,7 +730,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47476/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47478/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47499/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47518/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh index 1d8e8776..e3d3f5c5 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh @@ -714,7 +714,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47476/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47478/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47483/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47499/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47518/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh index 76375935..ff890ae7 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh @@ -527,7 +527,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47476/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47478/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47483/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47499/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47518/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch @@ -751,7 +751,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh index b579fc52..a115413e 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh @@ -545,7 +545,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47476/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47478/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47483/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47499/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47518/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch @@ -768,7 +768,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh index b69e5b64..2829ad1e 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh @@ -530,7 +530,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47476/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47478/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47483/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47495/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47499/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47518/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch @@ -756,7 +756,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch