Update CVE patchers

Likely breakage

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-08-19 14:12:09 -04:00
parent f7bb9e0c06
commit 44f54b0486
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
78 changed files with 931 additions and 78 deletions

@ -1 +1 @@
Subproject commit 7013be08a5e61218cdddef90f99fac884cb210e7
Subproject commit e5a4b873b76e02be581093c564091fdc0996ed54

View File

@ -941,6 +941,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
@ -953,7 +958,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p953"
editKernelLocalversion "-dos.p958"
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -604,6 +604,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -612,7 +617,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p612"
editKernelLocalversion "-dos.p617"
else echo "kernel_asus_grouper is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -641,6 +641,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
@ -650,7 +655,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p650"
editKernelLocalversion "-dos.p655"
else echo "kernel_htc_msm8960 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -771,6 +771,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
@ -783,7 +791,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p783"
editKernelLocalversion "-dos.p791"
else echo "kernel_htc_msm8994 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -856,6 +856,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -867,7 +875,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p867"
editKernelLocalversion "-dos.p875"
else echo "kernel_lge_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -723,6 +723,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -732,7 +740,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p732"
editKernelLocalversion "-dos.p740"
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -716,6 +716,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
@ -725,7 +730,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p725"
editKernelLocalversion "-dos.p730"
else echo "kernel_samsung_d2 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -400,11 +400,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p404"
editKernelLocalversion "-dos.p410"
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -519,6 +519,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -526,7 +531,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p526"
editKernelLocalversion "-dos.p531"
else echo "kernel_samsung_manta is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -535,6 +535,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -543,7 +547,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p543"
editKernelLocalversion "-dos.p547"
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -527,6 +527,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -535,7 +537,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p535"
editKernelLocalversion "-dos.p537"
else echo "kernel_samsung_tuna is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1060,6 +1060,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -1071,7 +1079,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1071"
editKernelLocalversion "-dos.p1079"
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -861,6 +861,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
@ -879,7 +887,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p879"
editKernelLocalversion "-dos.p887"
else echo "kernel_asus_fugu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -671,6 +671,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -681,7 +689,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p681"
editKernelLocalversion "-dos.p689"
else echo "kernel_asus_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1027,6 +1027,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -1040,7 +1048,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1040"
editKernelLocalversion "-dos.p1048"
else echo "kernel_google_dragon is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -665,6 +665,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -676,7 +684,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p676"
editKernelLocalversion "-dos.p684"
else echo "kernel_htc_flounder is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -791,6 +791,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
@ -803,7 +811,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p803"
editKernelLocalversion "-dos.p811"
else echo "kernel_huawei_angler is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -802,6 +802,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
@ -814,7 +822,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p814"
editKernelLocalversion "-dos.p822"
else echo "kernel_lge_bullhead is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1019,6 +1019,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -1029,7 +1038,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1029"
editKernelLocalversion "-dos.p1038"
else echo "kernel_zte_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -669,6 +669,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -679,7 +687,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p679"
editKernelLocalversion "-dos.p687"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -570,6 +570,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -577,7 +582,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p577"
editKernelLocalversion "-dos.p582"
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -715,6 +715,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -725,7 +733,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p725"
editKernelLocalversion "-dos.p733"
else echo "kernel_google_yellowstone is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -520,6 +520,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
@ -532,7 +540,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p532"
editKernelLocalversion "-dos.p540"
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -669,6 +669,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -679,7 +687,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p679"
editKernelLocalversion "-dos.p687"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -715,6 +715,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -724,7 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p724"
editKernelLocalversion "-dos.p732"
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -637,6 +637,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -646,7 +654,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p646"
editKernelLocalversion "-dos.p654"
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -639,6 +639,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -648,7 +656,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p648"
editKernelLocalversion "-dos.p656"
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1019,6 +1019,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
@ -1026,6 +1027,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
@ -1033,7 +1048,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1033"
editKernelLocalversion "-dos.p1048"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -862,6 +862,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
@ -870,7 +879,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p870"
editKernelLocalversion "-dos.p879"
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -384,10 +384,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p387"
editKernelLocalversion "-dos.p392"
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -835,6 +835,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
@ -847,7 +855,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p847"
editKernelLocalversion "-dos.p855"
else echo "kernel_google_marlin is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -561,6 +561,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
@ -571,7 +576,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p571"
editKernelLocalversion "-dos.p576"
else echo "kernel_google_msm is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -671,6 +671,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -681,7 +686,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p681"
editKernelLocalversion "-dos.p686"
else echo "kernel_htc_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -598,6 +598,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -605,7 +610,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p605"
editKernelLocalversion "-dos.p610"
else echo "kernel_lge_g3 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -535,6 +535,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -543,7 +548,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p543"
editKernelLocalversion "-dos.p548"
else echo "kernel_lge_hammerhead is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -178,10 +178,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p181"
editKernelLocalversion "-dos.p186"
else echo "kernel_lge_mako is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -583,13 +583,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p589"
editKernelLocalversion "-dos.p594"
else echo "kernel_lge_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -557,6 +557,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
@ -570,7 +578,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p570"
editKernelLocalversion "-dos.p578"
else echo "kernel_moto_shamu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -652,6 +652,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -660,7 +665,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p660"
editKernelLocalversion "-dos.p665"
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -855,6 +855,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -864,7 +873,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p864"
editKernelLocalversion "-dos.p873"
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -689,6 +689,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -698,7 +706,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p698"
editKernelLocalversion "-dos.p706"
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -843,6 +843,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
@ -852,7 +861,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p852"
editKernelLocalversion "-dos.p861"
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -526,11 +526,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p530"
editKernelLocalversion "-dos.p535"
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -599,6 +599,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
@ -609,7 +614,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p609"
editKernelLocalversion "-dos.p614"
else echo "kernel_samsung_jf is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -681,6 +681,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -693,7 +698,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p693"
editKernelLocalversion "-dos.p698"
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -412,10 +412,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p415"
editKernelLocalversion "-dos.p420"
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -508,11 +508,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p512"
editKernelLocalversion "-dos.p521"
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1099,6 +1099,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
@ -1106,6 +1107,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1116,7 +1131,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1116"
editKernelLocalversion "-dos.p1131"
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -534,6 +534,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -541,7 +549,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p541"
editKernelLocalversion "-dos.p549"
else echo "kernel_essential_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -410,12 +410,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -425,7 +439,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p425"
editKernelLocalversion "-dos.p439"
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -387,6 +387,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41042/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
@ -413,6 +414,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
@ -424,13 +426,36 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42285/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42286/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42292/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p430"
editKernelLocalversion "-dos.p455"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -486,11 +486,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p490"
editKernelLocalversion "-dos.p499"
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -387,6 +387,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41042/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
@ -413,6 +414,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
@ -424,13 +426,36 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42285/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42286/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42292/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p430"
editKernelLocalversion "-dos.p455"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -391,6 +391,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52882/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52887/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52889/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0565/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch
@ -841,11 +842,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42114/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42120/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42121/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42124/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42126/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42127/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/5.10/0003.patch
@ -865,7 +868,43 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42242/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42244/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42253/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42267/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42281/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42283/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42285/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42286/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42288/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42292/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42296/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42301/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42308/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42312/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42321/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43815/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43828/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43829/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43841/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43846/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43849/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -875,7 +914,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p875"
editKernelLocalversion "-dos.p914"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -389,6 +389,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52882/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52887/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52889/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0565/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch
@ -839,11 +840,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42114/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42120/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42121/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42124/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42126/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42127/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/5.10/0003.patch
@ -863,7 +866,43 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42242/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42244/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42253/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42267/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42281/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42283/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42285/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42286/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42288/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42292/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42296/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42301/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42308/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42312/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42321/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43815/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43828/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43829/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43841/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43846/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43849/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -873,7 +912,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p873"
editKernelLocalversion "-dos.p912"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -411,6 +411,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
@ -419,12 +420,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42296/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p424"
editKernelLocalversion "-dos.p442"
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -409,12 +409,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -424,7 +438,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p424"
editKernelLocalversion "-dos.p438"
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -590,6 +590,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41042/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
@ -616,6 +617,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
@ -627,13 +629,36 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42285/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42286/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42292/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42296/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p633"
editKernelLocalversion "-dos.p658"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -502,6 +502,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -509,7 +518,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p509"
editKernelLocalversion "-dos.p518"
else echo "kernel_google_wahoo is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -486,11 +486,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p490"
editKernelLocalversion "-dos.p499"
else echo "kernel_lge_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -490,11 +490,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p494"
editKernelLocalversion "-dos.p503"
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -414,6 +414,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
@ -421,6 +422,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -430,7 +445,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p430"
editKernelLocalversion "-dos.p445"
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -439,6 +439,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41042/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
@ -465,6 +466,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
@ -476,13 +478,36 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42285/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42286/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42292/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p482"
editKernelLocalversion "-dos.p507"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1065,6 +1065,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
@ -1072,6 +1073,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1081,7 +1096,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1081"
editKernelLocalversion "-dos.p1096"
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -385,6 +385,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41042/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
@ -411,6 +412,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
@ -422,13 +424,36 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42285/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42286/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42292/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p428"
editKernelLocalversion "-dos.p453"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -114,6 +114,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52882/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52887/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52889/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0841/5.4/0004.patch
@ -255,6 +256,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27395/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27396/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27397/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27398/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27399/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/5.4/0005.patch
@ -452,6 +454,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41022/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41042/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41049/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/5.4/0005.patch
@ -489,6 +492,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42124/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42127/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/5.4/0005.patch
@ -499,6 +503,39 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42276/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42281/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42283/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42285/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42286/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42287/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42288/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42292/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42306/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42308/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43829/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43841/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43846/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
@ -509,7 +546,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
editKernelLocalversion "-dos.p509"
editKernelLocalversion "-dos.p546"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -486,11 +486,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p490"
editKernelLocalversion "-dos.p499"
else echo "kernel_razer_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -410,6 +410,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
@ -417,6 +418,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -426,7 +441,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p426"
editKernelLocalversion "-dos.p441"
else echo "kernel_razer_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1025,11 +1025,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
@ -1038,7 +1050,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1038"
editKernelLocalversion "-dos.p1050"
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -501,11 +501,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p505"
editKernelLocalversion "-dos.p514"
else echo "kernel_sony_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -891,11 +891,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -907,7 +920,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p907"
editKernelLocalversion "-dos.p920"
else echo "kernel_sony_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -409,12 +409,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -424,7 +438,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p424"
editKernelLocalversion "-dos.p438"
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -419,12 +419,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -434,7 +448,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p434"
editKernelLocalversion "-dos.p448"
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -447,6 +447,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
@ -456,12 +457,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p461"
editKernelLocalversion "-dos.p479"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -269,6 +269,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41042/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
@ -295,6 +296,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42119/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
@ -306,10 +308,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42285/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42286/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42292/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p309"
editKernelLocalversion "-dos.p334"
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -449,6 +449,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
@ -458,12 +459,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42284/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42289/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42295/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42304/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42305/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43817/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p463"
editKernelLocalversion "-dos.p481"
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -501,12 +501,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42297/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p506"
editKernelLocalversion "-dos.p515"
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"