Update CVE patchers

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-08-25 12:30:55 -04:00
parent b40a1f97d4
commit 4dae73c77d
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
36 changed files with 294 additions and 249 deletions

View File

@ -5,7 +5,7 @@ bootable/libbootloader b44eeefd365e023a96ea36682cc60b46827a47cc
bootable/recovery 7c1eb300fbcf789024da690c96adb167d31aa5a5
build/bazel f3015c3bbd520d95216123e6761a2860e17acebf
build/blueprint c24408d5ae37cbcbec15205a02812b7d6c563b90
build/make e8636448168564515d61170f1acec4a95ce16a85
build/make 9ce529efc10432da0fe7468848ee703726ce969d
build/pesto 0f35caa8191635ace102f6d8c96318c5ed52dfe3
build/soong 59d5b37cce358e0d300392676d64191d3938608f
compatibility/cdd 43611a0b6d2c62ae1d08d951fccf8f2ab8dc60c6
@ -620,8 +620,8 @@ external/zlib a6339944368306c93d2d505e2f62d6b58f8d2fb4
external/zopfli 8637d0c2c9bad61506e1633cb221a418421c9f02
external/zstd 72b884f7fb33ebdebc0f61b5d0fb00fd6ca4713f
external/zxing c52e3ef5b428edbd4d4b2d51f67e673fe04ce09e
frameworks/av 923916e8261b7211d1c8639ff401ecb2b46ea292
frameworks/base 2bde4c3e5cd1dc6259a94eff16f526fd692587b4
frameworks/av e9b312c236408b1d33cb9209fb0686c7ae4171a1
frameworks/base ef50b9e77a439f30cb01b0a557c06d57434c76f4
frameworks/compile/libbcc 879916155c7757ba3a77c880ab1e949e8c6ed74b
frameworks/compile/mclinker 3f42d04145e3c2f6bd6f236bc4eb4630d84fb3b7
frameworks/compile/slang 5ad64063eeff6dd6c6affce457ed169e0e7b2a03
@ -668,7 +668,7 @@ hardware/google/graphics/gs101 97abc71ca5f3ac3f7bfa996aa559e0a6ae7f6733
hardware/google/interfaces e9fd9d77739aedee4e967d446828e30a65d59163
hardware/google/pixel 6c355463b8125a6ec2dd421b856eec1219501ed4
hardware/google/pixel-sepolicy 4f8794afa5220f47436dcfd1aa8b7fdbcbfab1e0
hardware/interfaces cbb0f2c6f762a7bb0fa4b3b499d5470f401b3a8a
hardware/interfaces ae469cee0dce6d71489588126a15da8e67a50102
hardware/invensense f02e206950b5e2726b6ca7e44ecd6c0a5d7c7912
hardware/knowles/athletico/sound_trigger_hal 0e0fa7e55608cae1a001dd7e7d5d69450ced38ef
hardware/libhardware d05ce0065b8147d05adf0d68c8a182ebbe668d27
@ -802,7 +802,7 @@ lineage/scripts e988793c8b7ef6922858e9f1fc7d3a0da90ab2f5
packages/apps/AudioFX 2c1be3c3b062e397bfd1e780ddb0bae1f99c1b84
packages/apps/Backgrounds f778988c6b8d36e87399b5678239d4f696e4cab2
packages/apps/BasicSmsReceiver 7c6a070c68413bab5343043af3df220226759568
packages/apps/Bluetooth 9639ba8fc43ee9e8affa7e795545c5d46d66bfb4
packages/apps/Bluetooth 4199ffb1db8c4f80914a39f78bdc2cecf7b6c8dd
packages/apps/Camera2 1a48d61effedfab1930dd3fa0931eafd3f50c32d
packages/apps/Car/Calendar fa4e0f22818948486aed8ce4845e1eae62321564
packages/apps/Car/Cluster 9b851957e49a1a47b6468c11e69a29794b1a8311
@ -996,7 +996,7 @@ sdk b3f92fe65cc033dc02107cc127e0ae0e2a50a967
system/apex e0731e932301591d3e86c7927fd8fa08bb585ae9
system/bpf bb1485f836d496570a337f6d7b809a3e44191f71
system/bpfprogs ed0aa6f1dac65b12a3eb1c3ee72947c9cb308aa4
system/bt fb268a6fb288db4222f8f710c2d71ee066281239
system/bt dd99e2366adbdac7f05aa1c162f887555d2afa78
system/ca-certificates 595badb2fb42aba9a55d78ce40be36856b4a0f78
system/chre daa9b56497b0c114dbfcf7ab758142a20eaeed9c
system/connectivity/wificond 17bbcb27838fe84bfc2e830cab54a6bd8a41fa55
@ -1111,8 +1111,8 @@ vendor/qcom/opensource/commonsys-intf/bluetooth 5be730e561df0103aa2ffa6cc5c649ac
vendor/qcom/opensource/commonsys-intf/display 1b983da4adfc9318dae482ac1b93387852399e88
vendor/qcom/opensource/commonsys/bluetooth_ext dfb8d1bf11f1b76413fbe2fd5bdbd7acddb1db6e
vendor/qcom/opensource/commonsys/display 9fceface2db07457e0253576ca63d4fb86a75155
vendor/qcom/opensource/commonsys/packages/apps/Bluetooth 20cee4102c2e8efed883eed622b1cebd086d4d14
vendor/qcom/opensource/commonsys/system/bt 7ce0972142a2067c60d71de53b9913b8d285f0f6
vendor/qcom/opensource/commonsys/packages/apps/Bluetooth 95d5a483465330c1daee381cef5a6253a5ff7a10
vendor/qcom/opensource/commonsys/system/bt 3510ffa0486d725073abfcae8967ecd518bdf3df
vendor/qcom/opensource/cryptfs_hw 70c5073d267b25186b1e713bdf89371336c28dc3
vendor/qcom/opensource/data-ipa-cfg-mgr 1e7dcdcc41a9e9f200b8921737b10dd8bda6d35b
vendor/qcom/opensource/dataservices 7df6e191d24b7aebfe6bdeaa330552321ba41a92

@ -1 +1 @@
Subproject commit 87c55be52883b283286903659828a5b969c49596
Subproject commit a520d9bdc00587eb8042b86eb5657b7e72e9cf70

View File

@ -83,7 +83,7 @@ commentPatches android_kernel_oneplus_msm8994.sh "CVE-2018-3585/3.10/0001.patch"
commentPatches android_kernel_oneplus_msm8996.sh "CVE-2017-13162/3.18/0001.patch" "CVE-2017-15951" "CVE-2017-16939" "CVE-2018-17972" "CVE-2019-2214" "CVE-2019-14070/ANY/0006.patch" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2022-42896/4.9" "CVE-2024-39467";
commentPatches android_kernel_oneplus_msm8998.sh "0008-Graphene-Kernel_Hardening-slab" "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-11599" "CVE-2019-19319" "CVE-2020-0305" "CVE-2020-8992" "CVE-2020-16166";
commentPatches android_kernel_oneplus_sm7250.sh "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600" "CVE-2021-30324" "CVE-2021-45469" "CVE-2022-42703/4.19/0003.patch";
commentPatches android_kernel_oneplus_sm8150.sh "CVE-2019-16746" "CVE-2019-19319" "CVE-2020-0067" "CVE-2020-8992" "CVE-2020-24588/4.14/0018.patch" "CVE-2021-30324" "CVE-2021-45469" "CVE-2022-1184/^5.18/0001.patch" "CVE-2022-42703/4.14/0002.patch";
commentPatches android_kernel_oneplus_sm8150.sh "CVE-2019-16746" "CVE-2019-19319" "CVE-2020-0067" "CVE-2020-8992" "CVE-2020-24588/4.14/0018.patch" "CVE-2021-30324" "CVE-2021-45469" "CVE-2022-1184/^5.18/0001.patch" "CVE-2022-42703/4.14/0002.patch" "CVE-2023-52901";
commentPatches android_kernel_oneplus_sm8250.sh "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600" "CVE-2022-1184/^5.18/0001.patch" "CVE-2022-42703/4.19/0003.patch";
commentPatches android_kernel_oneplus_sm8350.sh "CVE-2018-5873" "CVE-2022-1184/^5.18/0001.patch" "CVE-2023-52879/5.4";
commentPatches android_kernel_razer_msm8998.sh "0008-Graphene-Kernel_Hardening-slab" "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch" "CVE-2019-14070/ANY/0005.patch" "CVE-2020-16166";
@ -102,9 +102,9 @@ commentPatches android_kernel_sony_sdm660.sh "0008-Graphene-Kernel_Hardening-can
commentPatches android_kernel_sony_sdm845.sh "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992";
commentPatches android_kernel_xiaomi_msm8937.sh "CVE-2017-13162" "CVE-2019-14070" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-16166" "CVE-2021-39715/ANY/0001.patch" "CVE-2022-25715";
commentPatches android_kernel_xiaomi_sdm660.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch";
commentPatches android_kernel_xiaomi_sm8150.sh "CVE-2020-24588/4.14/0018.patch";
commentPatches android_kernel_xiaomi_sm8150.sh "CVE-2020-24588/4.14/0018.patch" "CVE-2023-52901";
commentPatches android_kernel_xiaomi_vayu.sh "CVE-2020-24588/4.14/0018.patch";
commentPatches android_kernel_xiaomi_sm6150.sh "CVE-2023-43550";
commentPatches android_kernel_xiaomi_sm6150.sh "CVE-2023-43550" "CVE-2023-52901";
commentPatches android_kernel_xiaomi_sm8250.sh "CVE-2018-5873" "CVE-2020-1749" "CVE-2021-3444" "CVE-2021-3600" "CVE-2022-22075";
commentPatches android_kernel_yandex_sdm660.sh "CVE-2019-11599" "CVE-2019-14070/ANY/0005.patch" "CVE-2019-19319" "CVE-2020-1749" "CVE-2020-8992" "CVE-2020-16166" "CVE-2024-35954";
commentPatches android_kernel_zte_msm8930.sh "CVE-2015-2922" "CVE-2017-11015/prima";

View File

@ -801,7 +801,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
@ -810,6 +810,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
@ -984,7 +985,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39488/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39489/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.14/0009.patch
@ -1015,7 +1016,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
@ -1032,19 +1033,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -1061,14 +1063,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1068"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1071"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -884,6 +884,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
@ -892,7 +893,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p892"
editKernelLocalversion "-dos.p893"
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -530,11 +530,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p534"
editKernelLocalversion "-dos.p535"
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -882,7 +882,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
@ -892,6 +892,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
@ -1064,7 +1065,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39488/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39489/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.14/0009.patch
@ -1111,19 +1112,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -1141,6 +1143,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1150,8 +1153,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1151"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1154"
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -555,6 +555,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -562,7 +563,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p562"
editKernelLocalversion "-dos.p563"
else echo "kernel_essential_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -371,7 +371,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.14/0009.patch
@ -396,9 +396,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
@ -412,18 +412,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -438,6 +438,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -446,8 +447,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p447"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p448"
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -445,13 +445,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p451"
editKernelLocalversion "-dos.p452"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -508,11 +508,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p512"
editKernelLocalversion "-dos.p513"
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -445,13 +445,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p451"
editKernelLocalversion "-dos.p452"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -426,6 +426,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086-alt/5.10/0003-alt.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1151/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23196/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23850/5.10/0002.patch
@ -931,6 +932,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43867/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -940,7 +942,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p940"
editKernelLocalversion "-dos.p942"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -424,6 +424,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086-alt/5.10/0003-alt.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1151/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23196/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23850/5.10/0002.patch
@ -929,6 +930,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43867/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -938,7 +940,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p938"
editKernelLocalversion "-dos.p940"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -357,7 +357,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39488/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39489/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.14/0009.patch
@ -389,9 +389,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
@ -408,20 +408,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -441,12 +442,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p446"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p448"
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -370,7 +370,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.14/0009.patch
@ -395,9 +395,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
@ -411,18 +411,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -437,6 +437,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -445,8 +446,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p446"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p447"
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -348,6 +348,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23368/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
@ -656,13 +657,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p662"
editKernelLocalversion "-dos.p664"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -524,6 +524,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -531,7 +532,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p531"
editKernelLocalversion "-dos.p532"
else echo "kernel_google_wahoo is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -508,11 +508,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p512"
editKernelLocalversion "-dos.p513"
else echo "kernel_lge_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -512,11 +512,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p516"
editKernelLocalversion "-dos.p517"
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -375,7 +375,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.14/0009.patch
@ -400,9 +400,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
@ -416,18 +416,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
@ -444,6 +444,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -452,8 +453,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p453"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p454"
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -497,13 +497,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p503"
editKernelLocalversion "-dos.p504"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -848,7 +848,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52885/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.14/0008.patch
@ -858,6 +858,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21459/qca-wifi-host-cmn/0001.patch --
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21475/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22386/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.14/0009.patch
@ -1029,7 +1030,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39488/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39489/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.14/0009.patch
@ -1076,19 +1077,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -1106,6 +1108,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1114,8 +1117,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1115"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1118"
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -443,13 +443,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p449"
editKernelLocalversion "-dos.p450"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -541,6 +541,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43867/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
@ -551,7 +552,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
editKernelLocalversion "-dos.p551"
editKernelLocalversion "-dos.p552"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -508,11 +508,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p512"
editKernelLocalversion "-dos.p513"
else echo "kernel_razer_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -371,7 +371,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.14/0009.patch
@ -396,9 +396,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
@ -412,18 +412,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
@ -440,6 +440,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -448,8 +449,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p449"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p450"
else echo "kernel_razer_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -994,7 +994,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.14/0009.patch
@ -1033,17 +1033,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -1056,6 +1056,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
@ -1063,8 +1064,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1064"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1065"
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -523,11 +523,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p527"
editKernelLocalversion "-dos.p528"
else echo "kernel_sony_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -861,7 +861,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.14/0009.patch
@ -900,17 +900,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -924,6 +924,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -934,8 +935,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p935"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p936"
else echo "kernel_sony_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -370,7 +370,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.14/0009.patch
@ -395,9 +395,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
@ -411,18 +411,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -437,6 +437,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -445,8 +446,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p446"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p447"
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -380,7 +380,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39467/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39501/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39509/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-40902/4.14/0009.patch
@ -405,9 +405,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
@ -421,17 +421,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42089/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
@ -447,6 +447,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -455,8 +456,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p456"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p457"
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -393,7 +393,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39488/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39489/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.14/0009.patch
@ -425,9 +425,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
@ -444,20 +444,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
@ -478,12 +479,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p483"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p485"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -327,10 +327,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p330"
editKernelLocalversion "-dos.p331"
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -395,7 +395,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39296/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39301/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39475/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39480/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39487/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39488/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39489/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-39499/4.14/0009.patch
@ -427,9 +427,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41015/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41016/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41017/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41020/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41035/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41041/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41044/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41059/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41063/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-41068/4.19/0002.patch
@ -446,20 +446,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42090/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42094/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42096/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42097/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42101/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42102/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42105/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42106/4.12-^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42115/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42131/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42143/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42145/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
@ -480,12 +481,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p485"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p487"
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -523,12 +523,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p528"
editKernelLocalversion "-dos.p529"
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"