Update CVE patchers

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-11-04 14:18:23 -05:00
parent bd64139e85
commit 47cd067046
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
25 changed files with 70 additions and 43 deletions

View File

@ -802,7 +802,7 @@ external/zstd e6a035a8df42f375160f2acabe3caa283a0184d7
external/zucchini 11a3a4cd409d6e0f4ccfcfb97cc962eeaeddde00 external/zucchini 11a3a4cd409d6e0f4ccfcfb97cc962eeaeddde00
external/zxing 248d7c742809ce1cbde1c4e6163d347e1feb274b external/zxing 248d7c742809ce1cbde1c4e6163d347e1feb274b
frameworks/av 17fdb80d01ef17849c4d4e1100d05d29977117b2 frameworks/av 17fdb80d01ef17849c4d4e1100d05d29977117b2
frameworks/base 16f91f009c1cc04e3667cd798aa9bc4a7f136c9e frameworks/base 8b6522d5cc627debecc1fa17e3d658704172066d
frameworks/compile/libbcc 81c07084cca2a6feab53eeb022f5d5a3ab5c10c5 frameworks/compile/libbcc 81c07084cca2a6feab53eeb022f5d5a3ab5c10c5
frameworks/compile/mclinker 18374a53dc8e00ec3667b4e1a257c9b4e41f007f frameworks/compile/mclinker 18374a53dc8e00ec3667b4e1a257c9b4e41f007f
frameworks/compile/slang 1738348ca3d011f3f340883bd48e03a8e6aeb143 frameworks/compile/slang 1738348ca3d011f3f340883bd48e03a8e6aeb143
@ -853,7 +853,7 @@ hardware/google/pixel-sepolicy eec446aa4fb152d6651c90de682cf73f8e202bd4
hardware/interfaces 2f83e1bda9536aaf406352c868a8192cc3526a69 hardware/interfaces 2f83e1bda9536aaf406352c868a8192cc3526a69
hardware/invensense 004a2dd5ea0d3a777520319536de119be1ba0049 hardware/invensense 004a2dd5ea0d3a777520319536de119be1ba0049
hardware/knowles/athletico/sound_trigger_hal 61ca38058a06c524677654d67d6f4bed7757f1d7 hardware/knowles/athletico/sound_trigger_hal 61ca38058a06c524677654d67d6f4bed7757f1d7
hardware/lge 56d44ca3fbb66e8a103379b9ebc684545ea649c4 hardware/lge e214ff7f463c2fe30cbd0747493dbcf830fd5c34
hardware/libhardware 0eb202d7ebd7d2410eb2f62c908c0341964a4829 hardware/libhardware 0eb202d7ebd7d2410eb2f62c908c0341964a4829
hardware/libhardware_legacy 50d9f52f7a7d4c70f10d6a9dca9a1f83a16c85ca hardware/libhardware_legacy 50d9f52f7a7d4c70f10d6a9dca9a1f83a16c85ca
hardware/lineage/compat 015d90baa57a65c5bdeed20997dfdede50e65ca7 hardware/lineage/compat 015d90baa57a65c5bdeed20997dfdede50e65ca7
@ -1029,13 +1029,13 @@ kernel/xiaomi/vayu 6c9febddfbd505b760d12f585288cf7612ad57d8
kernel/zuk/msm8996 cc57cb4ee3b7918b74d30604735d353b9a5fa23b kernel/zuk/msm8996 cc57cb4ee3b7918b74d30604735d353b9a5fa23b
libcore 59b2cb7f0c05106805a1a762d9271162d51f82d4 libcore 59b2cb7f0c05106805a1a762d9271162d51f82d4
libnativehelper 49ecc5f1e97e810d27e2c6558abdde49e875349b libnativehelper 49ecc5f1e97e810d27e2c6558abdde49e875349b
lineage-sdk 0b740679650b887691ac72462705913b7017ec26 lineage-sdk 49404b83d2fb2398a71d3d79b0caa8ea2a671a97
lineage/scripts 023e86f8fe46cbc3afc0009aac0aa361bf9187d5 lineage/scripts 023e86f8fe46cbc3afc0009aac0aa361bf9187d5
packages/apps/Aperture 1f91156b065e90d067136f5c2f8a635069605024 packages/apps/Aperture dfda463f8a096add0fb42379b3dfc57a5766b1a4
packages/apps/AudioFX 15e2a666d21551698ea0744996abcdc35e6c0cc1 packages/apps/AudioFX 15e2a666d21551698ea0744996abcdc35e6c0cc1
packages/apps/Backgrounds 8600246ca64332e9cac3993c172ceef80cf3cc74 packages/apps/Backgrounds 8600246ca64332e9cac3993c172ceef80cf3cc74
packages/apps/BasicSmsReceiver ae8e590ae7856e3007fe2b78489894a5fbf3f36a packages/apps/BasicSmsReceiver ae8e590ae7856e3007fe2b78489894a5fbf3f36a
packages/apps/Camera2 0285e006e481e1fa263dbee3f18389dfeefe5fac packages/apps/Camera2 019fbf8e3eb26f839246de37d607f221175d9d16
packages/apps/Car/Calendar 74a8375041155969dca0cf89725e30b28d905473 packages/apps/Car/Calendar 74a8375041155969dca0cf89725e30b28d905473
packages/apps/Car/Cluster be7bbdb8f1568a93caaca2d7c1292d4b12a380f1 packages/apps/Car/Cluster be7bbdb8f1568a93caaca2d7c1292d4b12a380f1
packages/apps/Car/DebuggingRestrictionController b1483fd34c896ab040f1abd43c99f0c4741223a5 packages/apps/Car/DebuggingRestrictionController b1483fd34c896ab040f1abd43c99f0c4741223a5
@ -1062,11 +1062,11 @@ packages/apps/CellBroadcastReceiver 3d7340eeac82125cd9091fc368a031e98f4db7fd
packages/apps/CertInstaller 98a80cd7f6f9ad8b46acb5c4798fd2d9253d37c4 packages/apps/CertInstaller 98a80cd7f6f9ad8b46acb5c4798fd2d9253d37c4
packages/apps/Contacts ff2da07f69fa3691f748418ac8fed11498cd4aec packages/apps/Contacts ff2da07f69fa3691f748418ac8fed11498cd4aec
packages/apps/DeskClock 8002d9cd376f1bee8819e1de08378a68f8ba9e0f packages/apps/DeskClock 8002d9cd376f1bee8819e1de08378a68f8ba9e0f
packages/apps/Dialer 63c20132d3b3c6bf1ae1f92b0877942a4fe290ce packages/apps/Dialer 5f0c93d67bb32051ceb75c8ffee56d76ad2cce20
packages/apps/DocumentsUI 7c092fdb040962c965c2f40a11389e4477d0177b packages/apps/DocumentsUI 7c092fdb040962c965c2f40a11389e4477d0177b
packages/apps/ElmyraService f1f42c57441fad817d5da7e04ecb742d389119c5 packages/apps/ElmyraService f1f42c57441fad817d5da7e04ecb742d389119c5
packages/apps/EmergencyInfo e8fe444bd8f8d9b807ed9da969d4147896af6142 packages/apps/EmergencyInfo e8fe444bd8f8d9b807ed9da969d4147896af6142
packages/apps/Etar 9c886e5728c4bbba4d3d9cd43ba181970b10239b packages/apps/Etar 1e58ac4448f64e76bc3b55a8b7b36cdb1ee4e2f3
packages/apps/ExactCalculator 92dd1417a6af570904e0d8c422f5a961ec693754 packages/apps/ExactCalculator 92dd1417a6af570904e0d8c422f5a961ec693754
packages/apps/FMRadio 1d304d4bb6c4b0d53758622cd7ce2d71795e1dbe packages/apps/FMRadio 1d304d4bb6c4b0d53758622cd7ce2d71795e1dbe
packages/apps/FlipFlap 238c75bdd274d0397214c8b865a6719e4151f844 packages/apps/FlipFlap 238c75bdd274d0397214c8b865a6719e4151f844
@ -1075,9 +1075,9 @@ packages/apps/HTMLViewer 40ee5730f96f840b1be7cbe8daabddd543eba49b
packages/apps/ImsServiceEntitlement 79a64a6e1d2602e81977a628ae385002bddd9e89 packages/apps/ImsServiceEntitlement 79a64a6e1d2602e81977a628ae385002bddd9e89
packages/apps/KeyChain d90f056762b0390f0c1a9823af51894f14a9f746 packages/apps/KeyChain d90f056762b0390f0c1a9823af51894f14a9f746
packages/apps/LineageCustomizer 6d78f750ddfe8b7b5821a9ce83860755491b8bd8 packages/apps/LineageCustomizer 6d78f750ddfe8b7b5821a9ce83860755491b8bd8
packages/apps/LineageParts e557a019ed4933f9b1843ce996d9a4c597528abd packages/apps/LineageParts ec84eacebce79cca2f19840e37bdc397d5bc7559
packages/apps/ManagedProvisioning 4986c737e21b57a0545a4ba4f63be02e26f09243 packages/apps/ManagedProvisioning 4986c737e21b57a0545a4ba4f63be02e26f09243
packages/apps/Messaging f8315f1d168df06d65ebdcf276d9c18e285ed795 packages/apps/Messaging 172b89c2174ab9d87284c303de572c2a1739959a
packages/apps/Nfc c28555164b8d2c8e12d7d4439f1ce9d83b9655ab packages/apps/Nfc c28555164b8d2c8e12d7d4439f1ce9d83b9655ab
packages/apps/OnDeviceAppPrediction 460e94bc49773d6e1a442fe0885e64bf3de98992 packages/apps/OnDeviceAppPrediction 460e94bc49773d6e1a442fe0885e64bf3de98992
packages/apps/OneTimeInitializer 3f70a0dbc890d9f125c4090b4ccfd5157ad87a64 packages/apps/OneTimeInitializer 3f70a0dbc890d9f125c4090b4ccfd5157ad87a64
@ -1085,14 +1085,14 @@ packages/apps/PhoneCommon f44c97cc5c6de1c980694af76d1692157dd50a0c
packages/apps/Profiles 9494c0176f0c36a342d73f4e5e8c27a10c4f3919 packages/apps/Profiles 9494c0176f0c36a342d73f4e5e8c27a10c4f3919
packages/apps/Provision 841d5199e1d1c64e7853fd953eed5247780908c1 packages/apps/Provision 841d5199e1d1c64e7853fd953eed5247780908c1
packages/apps/QuickAccessWallet ad935df93a556861473b3b411e255b4165d67fc0 packages/apps/QuickAccessWallet ad935df93a556861473b3b411e255b4165d67fc0
packages/apps/Recorder 031796ff29de62cc3a2faf6e53fa5295e4d24b51 packages/apps/Recorder e8bb637c19f7e2434bdb6b7ed8bf8bf51fa78acd
packages/apps/RemoteProvisioner 06d16c8031ce54bff1a07cc64f8b02140a3753c1 packages/apps/RemoteProvisioner 06d16c8031ce54bff1a07cc64f8b02140a3753c1
packages/apps/SafetyRegulatoryInfo f5dfd6ab7ea6aaa1a0014106110733e316379e95 packages/apps/SafetyRegulatoryInfo f5dfd6ab7ea6aaa1a0014106110733e316379e95
packages/apps/SecureElement 7e9d165899058103fa612ffb41858e4fd975182b packages/apps/SecureElement 7e9d165899058103fa612ffb41858e4fd975182b
packages/apps/Seedvault e03ad756817631611b7497d9fe7b2173e2756b9d packages/apps/Seedvault e03ad756817631611b7497d9fe7b2173e2756b9d
packages/apps/Settings 833a569dded0730edcee952721e6d172cba23a4f packages/apps/Settings be2a43e827a6e3ac11658176ed59d90c7a730044
packages/apps/SettingsIntelligence 4ef92f41721f25bbdec5c0b2433547ef323e72ac packages/apps/SettingsIntelligence 4ef92f41721f25bbdec5c0b2433547ef323e72ac
packages/apps/SetupWizard 86046a3a2e3f0c127c45132ede75c9f10a1377af packages/apps/SetupWizard 4f2169bfb89848d41e900c988764fb15cad20bb7
packages/apps/SimpleDeviceConfig 82d31b18dd2550e05f89248f128cb571eecc863a packages/apps/SimpleDeviceConfig 82d31b18dd2550e05f89248f128cb571eecc863a
packages/apps/SimpleSettingsConfig f5620aa22a44ac3a9794d0fda5c146efd7e0a11e packages/apps/SimpleSettingsConfig f5620aa22a44ac3a9794d0fda5c146efd7e0a11e
packages/apps/Stk 9cbb287404fb15a3a13c63f15b73962cdd18529d packages/apps/Stk 9cbb287404fb15a3a13c63f15b73962cdd18529d
@ -1108,10 +1108,10 @@ packages/apps/Traceur f1f531bd3dd414aa6b8d81d517b3c6c9164a657b
packages/apps/Trebuchet b3ad30740644828c9e2b4cc6901ee9d459cb003a packages/apps/Trebuchet b3ad30740644828c9e2b4cc6901ee9d459cb003a
packages/apps/TvSettings 82d09fbb7635d4eaf4496925768697f272614abc packages/apps/TvSettings 82d09fbb7635d4eaf4496925768697f272614abc
packages/apps/UniversalMediaPlayer a56170cac624f5cd5b5344de8a24b074049d9076 packages/apps/UniversalMediaPlayer a56170cac624f5cd5b5344de8a24b074049d9076
packages/apps/Updater e046bb8794752cc0f0dff2fbd9c3d47eb5a01c08 packages/apps/Updater 4f0652d53e7907b534a1c3f118fac45eb73e6404
packages/apps/WallpaperPicker 5b6254f657aa278f874b819f8de2edeb59acf85c packages/apps/WallpaperPicker 5b6254f657aa278f874b819f8de2edeb59acf85c
packages/apps/WallpaperPicker2 87e1441dc8743a3518d92f941e6f784c9eedc5c1 packages/apps/WallpaperPicker2 87e1441dc8743a3518d92f941e6f784c9eedc5c1
packages/inputmethods/LatinIME e7072a89778c3c0cba892949d9e90e72728ee6bc packages/inputmethods/LatinIME 62aef228f9ca56ffa6b9a7c5b191d2ee73390dfe
packages/inputmethods/LeanbackIME 945d4dc0f957bd3538a286b41babd93002d93d5c packages/inputmethods/LeanbackIME 945d4dc0f957bd3538a286b41babd93002d93d5c
packages/modules/AdServices cf7fdc79568f5adb4028e9339bea92429d109cb7 packages/modules/AdServices cf7fdc79568f5adb4028e9339bea92429d109cb7
packages/modules/AppSearch 5afd5a663c198a6b83ce8b4c49ae40903afae022 packages/modules/AppSearch 5afd5a663c198a6b83ce8b4c49ae40903afae022
@ -1153,20 +1153,20 @@ packages/providers/BookmarkProvider 6decb4dda8bdd12bdd468d8d3adf8f1cbf405a5d
packages/providers/CalendarProvider d3e7b7e388e965f93eebcbd0eb55a01bb066825f packages/providers/CalendarProvider d3e7b7e388e965f93eebcbd0eb55a01bb066825f
packages/providers/CallLogProvider 6b1f75f22f42379ae507ca1f958e8c83b5448a36 packages/providers/CallLogProvider 6b1f75f22f42379ae507ca1f958e8c83b5448a36
packages/providers/ContactsProvider 41edc60825cbe5f95e1f7d5646481a19b0fafbd9 packages/providers/ContactsProvider 41edc60825cbe5f95e1f7d5646481a19b0fafbd9
packages/providers/DownloadProvider ecf6e5833a3214ee1dceabeb15911cfb199d1c1f packages/providers/DownloadProvider e5356f9b69cbd1bcf2cb7e49ac65877578d19ada
packages/providers/MediaProvider 65a76a9ffe9f25f466bc37f5f888d98c46ee660b packages/providers/MediaProvider 65a76a9ffe9f25f466bc37f5f888d98c46ee660b
packages/providers/PartnerBookmarksProvider d982e500f09447d000f2ca67782831cc6b599330 packages/providers/PartnerBookmarksProvider d982e500f09447d000f2ca67782831cc6b599330
packages/providers/TelephonyProvider 64aa1787b56d1e9b03bcd18dc652aa7a395c4db0 packages/providers/TelephonyProvider 64aa1787b56d1e9b03bcd18dc652aa7a395c4db0
packages/providers/TvProvider c0e54c118bc93bce2f3edaa5fa9c59089c896dc8 packages/providers/TvProvider c0e54c118bc93bce2f3edaa5fa9c59089c896dc8
packages/providers/UserDictionaryProvider 1a5d6d4997847e0ec2040be5cb9a7efaf1620e72 packages/providers/UserDictionaryProvider 1a5d6d4997847e0ec2040be5cb9a7efaf1620e72
packages/resources/devicesettings ed9f07d4ae037417df213da01a7b76b6231c44a5 packages/resources/devicesettings 0e9ac825682001213efb4cbc454e74a64725b188
packages/screensavers/Basic d3aaa026dc3eaf7a249c1a00c1a0524e9c1bb349 packages/screensavers/Basic d3aaa026dc3eaf7a249c1a00c1a0524e9c1bb349
packages/screensavers/PhotoTable d5a731373f32b698776402bae8ff09a9676b6bb1 packages/screensavers/PhotoTable d5a731373f32b698776402bae8ff09a9676b6bb1
packages/services/AlternativeNetworkAccess dc09bf9c4b5652ef0096e4991f565854160395af packages/services/AlternativeNetworkAccess dc09bf9c4b5652ef0096e4991f565854160395af
packages/services/BuiltInPrintService 83c1af9d5d014036c20a87c3b068a52fb0e6e324 packages/services/BuiltInPrintService 83c1af9d5d014036c20a87c3b068a52fb0e6e324
packages/services/Car cdffba0abe1ccb414799a46971eb699b658e1996 packages/services/Car cdffba0abe1ccb414799a46971eb699b658e1996
packages/services/Iwlan 399b21135748ac6da9a8a10c72bec73a8339ccaf packages/services/Iwlan 399b21135748ac6da9a8a10c72bec73a8339ccaf
packages/services/Mms c1db4f516a3d6ab623f698c9e51cd542a6fa669e packages/services/Mms 417db36b9909f9bc6cacc3a5e74bc4e866848a55
packages/services/Mtp 5d827f2e69dacf1cfddc03e66466f9af9a908b9f packages/services/Mtp 5d827f2e69dacf1cfddc03e66466f9af9a908b9f
packages/services/Telecomm c9ddef28175c3054703d3f492da3c259a145aafb packages/services/Telecomm c9ddef28175c3054703d3f492da3c259a145aafb
packages/services/Telephony 544ea2dd2707dd10ab6f15b5e0f98a579a7d32ab packages/services/Telephony 544ea2dd2707dd10ab6f15b5e0f98a579a7d32ab
@ -1337,7 +1337,7 @@ tools/tradefederation/prebuilts dcb8956ae70359e7f554b9eb50e185d2a7feb6cd
tools/treble d74b74010472ba957f4125b676a41c23ca91e549 tools/treble d74b74010472ba957f4125b676a41c23ca91e549
tools/trebuchet 9ff3c1fd3ea48b7c148fc1f6e2456dbc5596ca8d tools/trebuchet 9ff3c1fd3ea48b7c148fc1f6e2456dbc5596ca8d
vendor/codeaurora/telephony ebdb27e3a6d9f94aed27dee2819829a3d656ad20 vendor/codeaurora/telephony ebdb27e3a6d9f94aed27dee2819829a3d656ad20
vendor/crowdin d885a80467099b4ace6becc0f16a4923270f9062 vendor/crowdin 610b3088617692d4cc77b091649ea6c276c67932
vendor/essential/mata 3e37777606e559f33c9e1d247b15de1fac359fe5 vendor/essential/mata 3e37777606e559f33c9e1d247b15de1fac359fe5
vendor/fairphone/FP3 6ebc77ace3dce27e03973ddb4bb9629de576cdd7 vendor/fairphone/FP3 6ebc77ace3dce27e03973ddb4bb9629de576cdd7
vendor/fairphone/FP4 6482b251c7c1620cbc85d513cfd12fce70ff6eb6 vendor/fairphone/FP4 6482b251c7c1620cbc85d513cfd12fce70ff6eb6
@ -1414,7 +1414,7 @@ vendor/qcom/opensource/data-ipa-cfg-mgr 3c0a7c4a067323d92e1091429e5f6bb6e099473f
vendor/qcom/opensource/data-ipa-cfg-mgr-legacy-um bb0df39c52503c687d39903155b44e85c32708aa vendor/qcom/opensource/data-ipa-cfg-mgr-legacy-um bb0df39c52503c687d39903155b44e85c32708aa
vendor/qcom/opensource/dataservices c8adc2a4daddce3176b928661fb7e83b72dd2423 vendor/qcom/opensource/dataservices c8adc2a4daddce3176b928661fb7e83b72dd2423
vendor/qcom/opensource/display 69f7b0550973a0f6bfb3ff9a244b75dfe008c781 vendor/qcom/opensource/display 69f7b0550973a0f6bfb3ff9a244b75dfe008c781
vendor/qcom/opensource/fm-commonsys 38285208731a8b72500db60d3e8ae321a3d88434 vendor/qcom/opensource/fm-commonsys 3e305a26fc68d2ee59b584a950081769c0beefa1
vendor/qcom/opensource/healthd-ext 398ea4b554fffbed4a59294b51085b7eba8b5f5d vendor/qcom/opensource/healthd-ext 398ea4b554fffbed4a59294b51085b7eba8b5f5d
vendor/qcom/opensource/interfaces 7e41eeb480578966fd87d42f439aa0b4fb4188c9 vendor/qcom/opensource/interfaces 7e41eeb480578966fd87d42f439aa0b4fb4188c9
vendor/qcom/opensource/libfmjni e33227ed63c6b8e7df0b638f556bf14fa99acd83 vendor/qcom/opensource/libfmjni e33227ed63c6b8e7df0b638f556bf14fa99acd83

@ -1 +1 @@
Subproject commit d1e8757ae001ea4f8dd2498905757afec1590b44 Subproject commit 9ed056697c2f924eaf069f6e72b3a978f0a458db

View File

@ -689,6 +689,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38422/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch
@ -786,7 +787,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p786" editKernelLocalversion "-dos.p787"
else echo "kernel_motorola_msm8952 is unavailable, not patching."; else echo "kernel_motorola_msm8952 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -984,6 +984,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38422/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch
@ -1113,7 +1114,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1113" editKernelLocalversion "-dos.p1114"
else echo "kernel_zte_msm8996 is unavailable, not patching."; else echo "kernel_zte_msm8996 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -604,6 +604,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38422/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch
@ -701,7 +702,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p701" editKernelLocalversion "-dos.p702"
else echo "kernel_motorola_msm8992 is unavailable, not patching."; else echo "kernel_motorola_msm8992 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -606,6 +606,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38422/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch
@ -703,7 +704,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p703" editKernelLocalversion "-dos.p704"
else echo "kernel_oneplus_msm8994 is unavailable, not patching."; else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -965,6 +965,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27427/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27428/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27428/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33032/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35806/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35806/4.14/0008.patch
@ -1018,6 +1019,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38422/audio-kernel/0002.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.14/0008.patch
@ -1216,7 +1218,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1216" editKernelLocalversion "-dos.p1218"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching."; else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -838,6 +838,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38423/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
@ -996,7 +997,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p996" editKernelLocalversion "-dos.p997"
else echo "kernel_yandex_sdm660 is unavailable, not patching."; else echo "kernel_yandex_sdm660 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -800,6 +800,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38422/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch
@ -927,7 +928,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p927" editKernelLocalversion "-dos.p928"
else echo "kernel_google_marlin is unavailable, not patching."; else echo "kernel_google_marlin is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -656,6 +656,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38422/ANY/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch
@ -753,7 +754,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p753" editKernelLocalversion "-dos.p754"
else echo "kernel_nextbit_msm8992 is unavailable, not patching."; else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -476,6 +476,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38423/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
@ -636,7 +637,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p636" editKernelLocalversion "-dos.p637"
else echo "kernel_xiaomi_sdm660 is unavailable, not patching."; else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -1048,6 +1048,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33014/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33014/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33015/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33015/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33032/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35806/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35806/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.14/0009.patch
@ -1099,6 +1100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38422/audio-kernel/0002.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.14/0008.patch
@ -1303,7 +1305,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p1303" editKernelLocalversion "-dos.p1305"
else echo "kernel_xiaomi_sm8150 is unavailable, not patching."; else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -500,6 +500,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38423/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
@ -662,7 +663,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p662" editKernelLocalversion "-dos.p663"
else echo "kernel_essential_msm8998 is unavailable, not patching."; else echo "kernel_essential_msm8998 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -449,6 +449,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38423/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
@ -612,7 +613,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p612" editKernelLocalversion "-dos.p613"
else echo "kernel_fxtec_msm8998 is unavailable, not patching."; else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -283,6 +283,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27428/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33014/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33014/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33032/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35789/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35789/4.14/0008.patch
@ -343,6 +344,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38422/audio-kernel/0002.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.14/0008.patch
@ -557,7 +559,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p557" editKernelLocalversion "-dos.p559"
else echo "kernel_google_msm-4.14 is unavailable, not patching."; else echo "kernel_google_msm-4.14 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -471,6 +471,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38423/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
@ -636,7 +637,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p636" editKernelLocalversion "-dos.p637"
else echo "kernel_google_wahoo is unavailable, not patching."; else echo "kernel_google_wahoo is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -449,6 +449,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38423/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
@ -612,7 +613,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p612" editKernelLocalversion "-dos.p613"
else echo "kernel_lge_msm8996 is unavailable, not patching."; else echo "kernel_lge_msm8996 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -454,6 +454,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38423/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
@ -617,7 +618,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p617" editKernelLocalversion "-dos.p618"
else echo "kernel_oneplus_msm8998 is unavailable, not patching."; else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -1003,6 +1003,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27428/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33015/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33015/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33032/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35806/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35806/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.14/0009.patch
@ -1054,6 +1055,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38422/audio-kernel/0002.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.14/0008.patch
@ -1257,7 +1259,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p1257" editKernelLocalversion "-dos.p1259"
else echo "kernel_oneplus_sm8150 is unavailable, not patching."; else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -381,6 +381,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37353/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38402/5.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38402/5.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38422/audio-kernel/0001.patch --directory=techpack/audio
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38555/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38555/^6.9/0001.patch
@ -715,7 +716,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
editKernelLocalversion "-dos.p715" editKernelLocalversion "-dos.p716"
else echo "kernel_oneplus_sm8350 is unavailable, not patching."; else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -449,6 +449,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38423/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
@ -612,7 +613,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p612" editKernelLocalversion "-dos.p613"
else echo "kernel_razer_msm8998 is unavailable, not patching."; else echo "kernel_razer_msm8998 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -472,6 +472,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38423/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
@ -633,7 +634,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p633" editKernelLocalversion "-dos.p634"
else echo "kernel_sony_sdm660 is unavailable, not patching."; else echo "kernel_sony_sdm660 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -318,6 +318,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33014/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33014/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33015/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33015/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33027/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33027/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33032/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35789/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35789/4.14/0008.patch
@ -595,7 +596,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p595" editKernelLocalversion "-dos.p596"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching."; else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -323,6 +323,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33014/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33014/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33015/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33015/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33027/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33027/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33032/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-33060/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-34027/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35789/4.14/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35789/4.14/0008.patch
@ -599,7 +600,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p599" editKernelLocalversion "-dos.p600"
else echo "kernel_xiaomi_vayu is unavailable, not patching."; else echo "kernel_xiaomi_vayu is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -462,6 +462,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971-aosp/4.4/0011.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37078/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-37356/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38381/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38423/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch
@ -626,7 +627,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directo
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p626" editKernelLocalversion "-dos.p627"
else echo "kernel_zuk_msm8996 is unavailable, not patching."; else echo "kernel_zuk_msm8996 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"