Update CVE patchers

maybe breakage

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-10-09 12:35:48 -04:00
parent 0af36393f5
commit 48f5e5dd63
No known key found for this signature in database
GPG key ID: E599F62ECBAEAF2E
64 changed files with 897 additions and 366 deletions

View file

@ -295,6 +295,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.4/0001.patch
@ -395,15 +396,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p403"
editKernelLocalversion "-dos.p408"
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -660,6 +660,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
@ -850,20 +851,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46743/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
@ -876,7 +890,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p876"
editKernelLocalversion "-dos.p890"
else echo "kernel_google_marlin is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -472,6 +472,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.4/0001.patch
@ -572,11 +573,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
@ -587,7 +592,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p587"
editKernelLocalversion "-dos.p592"
else echo "kernel_google_msm is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -581,6 +581,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33059/ANY/0003.patch
@ -682,11 +683,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -697,7 +702,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p697"
editKernelLocalversion "-dos.p702"
else echo "kernel_htc_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -508,6 +508,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33059/ANY/0003.patch
@ -609,11 +610,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -621,7 +626,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p621"
editKernelLocalversion "-dos.p626"
else echo "kernel_lge_g3 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -445,6 +445,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.4/0001.patch
@ -546,11 +547,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -559,7 +564,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p559"
editKernelLocalversion "-dos.p564"
else echo "kernel_lge_hammerhead is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -89,6 +89,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.4/0001.patch
@ -189,15 +190,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p197"
editKernelLocalversion "-dos.p202"
else echo "kernel_lge_mako is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -494,6 +494,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.4/0001.patch
@ -594,18 +595,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p605"
editKernelLocalversion "-dos.p610"
else echo "kernel_lge_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -422,6 +422,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33110/ANY/0002.patch
@ -573,13 +574,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
@ -593,7 +601,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p593"
editKernelLocalversion "-dos.p601"
else echo "kernel_moto_shamu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -561,6 +561,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.4/0001.patch
@ -663,11 +664,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -676,7 +681,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p676"
editKernelLocalversion "-dos.p681"
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -677,6 +677,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
@ -864,6 +865,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.4/0008.patch
@ -872,22 +874,35 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46743/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -897,7 +912,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p897"
editKernelLocalversion "-dos.p912"
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -558,6 +558,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33110/ANY/0002.patch
@ -706,13 +707,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -722,7 +730,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p722"
editKernelLocalversion "-dos.p730"
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -665,6 +665,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
@ -852,6 +853,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.4/0008.patch
@ -860,22 +862,35 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46743/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
@ -885,7 +900,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p885"
editKernelLocalversion "-dos.p900"
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -436,6 +436,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33059/ANY/0003.patch
@ -537,16 +538,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p546"
editKernelLocalversion "-dos.p551"
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -509,6 +509,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.4/0001.patch
@ -610,11 +611,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
@ -625,7 +630,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p625"
editKernelLocalversion "-dos.p630"
else echo "kernel_samsung_jf is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -591,6 +591,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-39192/4.4/0001.patch
@ -692,11 +693,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -709,7 +714,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p709"
editKernelLocalversion "-dos.p714"
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -322,6 +322,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-7192/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33059/ANY/0003.patch
@ -423,15 +424,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p431"
editKernelLocalversion "-dos.p436"
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View file

@ -255,6 +255,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-26545/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28584/4.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31084/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31085/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch
@ -522,8 +523,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42153/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.4/0008.patch
@ -536,33 +539,50 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42309/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44938/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46721/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46722/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46723/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46738/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46743/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46744/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46750/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46755/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46756/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46757/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46758/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46759/4.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46771/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46777/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46800/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46829/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p562"
editKernelLocalversion "-dos.p582"
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"