Update CVE patchers

entirely unchecked, extremely likely to be breakage

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-10-22 09:01:45 -04:00
parent 1f94fe7dbc
commit 5934339248
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
81 changed files with 2508 additions and 93 deletions

View File

@ -798,7 +798,7 @@ kernel/xiaomi/sm8150 950783ac4623027778367cb8f8c6c24f17e88dd9
libcore 3d79b82fa5058fadc5c9696811b38a48cb5eddbb
libnativehelper 4127df85264539c1fcc6dcbf59410e9edaa2e0c6
lineage-sdk d4565e22e04e8030ac8d8551dfe11a868b8366a9
lineage/scripts 888f78428b586276ee08d9aa3122174a8792c767
lineage/scripts 8310968012dc4a227a066d7937568cb8a62b4314
packages/apps/AudioFX 2c1be3c3b062e397bfd1e780ddb0bae1f99c1b84
packages/apps/Backgrounds f778988c6b8d36e87399b5678239d4f696e4cab2
packages/apps/BasicSmsReceiver 7c6a070c68413bab5343043af3df220226759568

View File

@ -6,7 +6,7 @@ bootable/recovery 4c1835f494be558f71c84e3abceb3d773f6c6369
build/bazel 9898ac01c9525bf91d23a1c2b83fc401603cb6d3
build/bazel_common_rules f6cf03f7d0ba2e7cb05c0109a5cd57aae07dc6e8
build/blueprint ca8f0e8e3571c866d69d34cbd47b3989abe8e8cd
build/make 2bc8b8d55c629a34e2237d7d11283370e6c99fad
build/make 171c37a6b454de91adfe66c8e0e1734e17362a2c
build/pesto d554620e6f7ad178b71ebb8c4269830cbd24ad8c
build/soong c80e6e3b82f2c0fded69b44b514d4c4d5519c9b5
cts 5f6e2dedd307f20dcf663ae17ab5db8664092430
@ -802,7 +802,7 @@ external/zstd e6a035a8df42f375160f2acabe3caa283a0184d7
external/zucchini 11a3a4cd409d6e0f4ccfcfb97cc962eeaeddde00
external/zxing 248d7c742809ce1cbde1c4e6163d347e1feb274b
frameworks/av 17fdb80d01ef17849c4d4e1100d05d29977117b2
frameworks/base 372c4384dd8b995cc06a4459d3dfa70ac9603565
frameworks/base 4bb2fcc853d835cd96c3f65b61c58f6e907dfd75
frameworks/compile/libbcc 81c07084cca2a6feab53eeb022f5d5a3ab5c10c5
frameworks/compile/mclinker 18374a53dc8e00ec3667b4e1a257c9b4e41f007f
frameworks/compile/slang 1738348ca3d011f3f340883bd48e03a8e6aeb143
@ -1027,10 +1027,10 @@ kernel/xiaomi/sm6150 749a9b6f6704202e61dea9981435107356db3cae
kernel/xiaomi/sm8250 f3d39dae3253e7f8bb623eb83a146088f3174148
kernel/xiaomi/vayu 6c9febddfbd505b760d12f585288cf7612ad57d8
kernel/zuk/msm8996 cc57cb4ee3b7918b74d30604735d353b9a5fa23b
libcore 2a7d66adbcde1862f9295ae0a13f1751b193e4d7
libcore 59b2cb7f0c05106805a1a762d9271162d51f82d4
libnativehelper 49ecc5f1e97e810d27e2c6558abdde49e875349b
lineage-sdk 0b740679650b887691ac72462705913b7017ec26
lineage/scripts 888f78428b586276ee08d9aa3122174a8792c767
lineage/scripts 8310968012dc4a227a066d7937568cb8a62b4314
packages/apps/Aperture 1f91156b065e90d067136f5c2f8a635069605024
packages/apps/AudioFX 15e2a666d21551698ea0744996abcdc35e6c0cc1
packages/apps/Backgrounds 8600246ca64332e9cac3993c172ceef80cf3cc74
@ -1090,7 +1090,7 @@ packages/apps/RemoteProvisioner 06d16c8031ce54bff1a07cc64f8b02140a3753c1
packages/apps/SafetyRegulatoryInfo f5dfd6ab7ea6aaa1a0014106110733e316379e95
packages/apps/SecureElement 7e9d165899058103fa612ffb41858e4fd975182b
packages/apps/Seedvault e03ad756817631611b7497d9fe7b2173e2756b9d
packages/apps/Settings 6eeb7082ba8fad775706a58711c0de881e284163
packages/apps/Settings 833a569dded0730edcee952721e6d172cba23a4f
packages/apps/SettingsIntelligence 4ef92f41721f25bbdec5c0b2433547ef323e72ac
packages/apps/SetupWizard 86046a3a2e3f0c127c45132ede75c9f10a1377af
packages/apps/SimpleDeviceConfig 82d31b18dd2550e05f89248f128cb571eecc863a
@ -1116,7 +1116,7 @@ packages/inputmethods/LeanbackIME 945d4dc0f957bd3538a286b41babd93002d93d5c
packages/modules/AdServices cf7fdc79568f5adb4028e9339bea92429d109cb7
packages/modules/AppSearch 5afd5a663c198a6b83ce8b4c49ae40903afae022
packages/modules/ArtPrebuilt 2363a7573c76c3731c66f36a858ab7811e373b1a
packages/modules/Bluetooth e9534a1a3e0a5e17fc449ffc54d911c4a8535d56
packages/modules/Bluetooth bf8e72c9d2291a8dcb989734cd745fd26874dde5
packages/modules/BootPrebuilt/5.10/arm64 95cfa206c00dd5fcc72991f80ddfe383e76095ad
packages/modules/BootPrebuilt/5.4/arm64 3130a05a2f71e6c43892db92148956af0b05a406
packages/modules/CaptivePortalLogin 1c4915e0f233b0f2ed7883bbb193df3980a72fc5

@ -1 +1 @@
Subproject commit de5c44087270023dc15431b9a8ba124713c4af5c
Subproject commit 74c6d717f6e5f36645a06eef425c0a00a8dec144

@ -1 +1 @@
Subproject commit 77eb4d2c11397b255977f66242090478f09e2e1a
Subproject commit 6570e6668fe3fe163cd713d4cc37343e74637ac1

View File

@ -827,6 +827,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
@ -963,6 +969,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
@ -975,7 +991,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p975"
editKernelLocalversion "-dos.p991"
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -492,6 +492,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -628,6 +634,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -636,7 +652,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p636"
editKernelLocalversion "-dos.p652"
else echo "kernel_asus_grouper is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -528,6 +528,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -664,6 +670,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
@ -673,7 +689,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p673"
editKernelLocalversion "-dos.p689"
else echo "kernel_htc_msm8960 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -616,6 +616,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -804,6 +811,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
@ -816,7 +835,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p816"
editKernelLocalversion "-dos.p835"
else echo "kernel_htc_msm8994 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -703,6 +703,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -889,6 +896,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -900,7 +919,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p900"
editKernelLocalversion "-dos.p919"
else echo "kernel_lge_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -565,6 +565,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
@ -756,6 +763,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -765,7 +784,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p765"
editKernelLocalversion "-dos.p784"
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -603,6 +603,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -739,6 +745,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
@ -748,7 +764,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p748"
editKernelLocalversion "-dos.p764"
else echo "kernel_samsung_d2 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -287,6 +287,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48804/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -425,11 +431,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p429"
editKernelLocalversion "-dos.p445"
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -406,6 +406,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -543,6 +549,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -550,7 +566,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p550"
editKernelLocalversion "-dos.p566"
else echo "kernel_samsung_manta is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -442,6 +442,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -553,6 +556,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -561,7 +571,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p561"
editKernelLocalversion "-dos.p571"
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -435,6 +435,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -543,6 +546,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -551,7 +561,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p551"
editKernelLocalversion "-dos.p561"
else echo "kernel_samsung_tuna is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -863,6 +863,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
@ -1107,6 +1120,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -1118,7 +1148,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1118"
editKernelLocalversion "-dos.p1148"
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -709,6 +709,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
@ -893,6 +900,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
@ -911,7 +933,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p911"
editKernelLocalversion "-dos.p933"
else echo "kernel_asus_fugu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -513,6 +513,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -705,6 +712,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -715,7 +734,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p715"
editKernelLocalversion "-dos.p734"
else echo "kernel_asus_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -826,6 +826,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
@ -1075,6 +1090,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -1088,7 +1120,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1088"
editKernelLocalversion "-dos.p1120"
else echo "kernel_google_dragon is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -508,6 +508,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -699,6 +706,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -710,7 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p710"
editKernelLocalversion "-dos.p732"
else echo "kernel_htc_flounder is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -635,6 +635,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -823,6 +830,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
@ -835,7 +857,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p835"
editKernelLocalversion "-dos.p857"
else echo "kernel_huawei_angler is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -646,6 +646,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -834,6 +841,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
@ -846,7 +868,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p846"
editKernelLocalversion "-dos.p868"
else echo "kernel_lge_bullhead is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -812,6 +812,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
@ -1070,6 +1083,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -1080,7 +1110,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1080"
editKernelLocalversion "-dos.p1110"
else echo "kernel_zte_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -510,6 +510,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -703,6 +710,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -713,7 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p713"
editKernelLocalversion "-dos.p732"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -454,6 +454,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
@ -593,6 +599,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -600,7 +616,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p600"
editKernelLocalversion "-dos.p616"
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -559,6 +559,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
@ -749,6 +756,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -759,7 +781,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p759"
editKernelLocalversion "-dos.p781"
else echo "kernel_google_yellowstone is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -364,6 +364,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -554,6 +561,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
@ -566,7 +585,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p566"
editKernelLocalversion "-dos.p585"
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -510,6 +510,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -703,6 +710,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -713,7 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p713"
editKernelLocalversion "-dos.p732"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -560,6 +560,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -747,6 +754,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -756,7 +776,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p756"
editKernelLocalversion "-dos.p776"
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -480,6 +480,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -671,6 +678,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -680,7 +699,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p680"
editKernelLocalversion "-dos.p699"
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -482,6 +482,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -673,6 +680,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -682,7 +701,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p682"
editKernelLocalversion "-dos.p701"
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -644,6 +644,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48949/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48956/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48988/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
@ -1141,6 +1168,36 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
@ -1148,7 +1205,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1148"
editKernelLocalversion "-dos.p1205"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -583,6 +583,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -944,6 +963,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
@ -952,7 +992,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p952"
editKernelLocalversion "-dos.p992"
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -276,6 +276,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
@ -407,10 +413,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p410"
editKernelLocalversion "-dos.p426"
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -626,6 +626,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
@ -881,6 +894,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
@ -893,7 +924,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p893"
editKernelLocalversion "-dos.p924"
else echo "kernel_google_marlin is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -449,6 +449,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -584,6 +590,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
@ -594,7 +610,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p594"
editKernelLocalversion "-dos.p610"
else echo "kernel_google_msm is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -555,6 +555,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
@ -694,6 +700,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -704,7 +720,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p704"
editKernelLocalversion "-dos.p720"
else echo "kernel_htc_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -483,6 +483,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
@ -621,6 +627,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -628,7 +644,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p628"
editKernelLocalversion "-dos.p644"
else echo "kernel_lge_g3 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -422,6 +422,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -558,6 +564,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -566,7 +582,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p566"
editKernelLocalversion "-dos.p582"
else echo "kernel_lge_hammerhead is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -76,6 +76,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/^6.3/0002.patch
@ -201,10 +207,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p204"
editKernelLocalversion "-dos.p220"
else echo "kernel_lge_mako is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -468,6 +468,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
@ -606,13 +612,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p612"
editKernelLocalversion "-dos.p628"
else echo "kernel_lge_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -396,6 +396,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -590,6 +597,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
@ -603,7 +622,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p603"
editKernelLocalversion "-dos.p622"
else echo "kernel_moto_shamu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -536,6 +536,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
@ -675,6 +681,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -683,7 +699,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p683"
editKernelLocalversion "-dos.p699"
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -643,6 +643,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
@ -906,6 +919,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -915,7 +946,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p915"
editKernelLocalversion "-dos.p946"
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -533,6 +533,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -723,6 +730,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -732,7 +751,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p732"
editKernelLocalversion "-dos.p751"
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -631,6 +631,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
@ -894,6 +907,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
@ -903,7 +934,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p903"
editKernelLocalversion "-dos.p934"
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -411,6 +411,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
@ -549,11 +555,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p553"
editKernelLocalversion "-dos.p569"
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -486,6 +486,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -622,6 +628,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
@ -632,7 +648,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p632"
editKernelLocalversion "-dos.p648"
else echo "kernel_samsung_jf is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -568,6 +568,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -704,6 +710,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -716,7 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p716"
editKernelLocalversion "-dos.p732"
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -297,6 +297,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
@ -435,10 +441,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p438"
editKernelLocalversion "-dos.p454"
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -207,6 +207,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
@ -586,11 +607,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p590"
editKernelLocalversion "-dos.p632"
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -723,6 +723,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48949/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48956/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48988/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
@ -1223,6 +1250,36 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1235,7 +1292,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p1235"
editKernelLocalversion "-dos.p1292"
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -242,6 +242,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -608,6 +629,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -615,7 +658,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p615"
editKernelLocalversion "-dos.p658"
else echo "kernel_essential_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -102,6 +102,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -484,6 +486,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -495,7 +523,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-alt/4.9/0001.patch
editKernelLocalversion "-dos.p495"
editKernelLocalversion "-dos.p523"
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -104,6 +104,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
@ -149,6 +151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
@ -520,13 +523,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p526"
editKernelLocalversion "-dos.p572"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -192,6 +192,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -562,11 +582,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p566"
editKernelLocalversion "-dos.p608"
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -104,6 +104,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
@ -149,6 +151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
@ -520,13 +523,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p526"
editKernelLocalversion "-dos.p572"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -108,6 +108,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48953/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48956/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48959/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48961/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48970/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48971/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48977/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48981/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48982/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48986/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48987/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48993/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48995/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48997/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49000/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49006/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49013/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49014/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49017/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49019/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49022/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49023/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49025/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49028/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49030/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
@ -140,7 +190,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2124/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2156/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2163/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2166/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2176/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2235/^6.3/0001.patch
@ -200,7 +249,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-25775/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-26545/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28327/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28466/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30456/5.10/0002.patch
@ -416,6 +464,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52906/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52915/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0565/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch
@ -1055,7 +1104,85 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47671/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-selinux-rwx/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47684/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47710/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47713/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47716/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47718/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47735/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47740/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47742/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47745/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47756/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49851/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49858/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49863/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49868/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49878/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49879/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49884/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49889/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49890/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49892/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49895/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49907/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49913/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49930/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49933/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49936/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49945/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49977/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49983/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49985/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50001/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50033/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50039/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50046/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch
@ -1066,7 +1193,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p1066"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49881/5.10/0002.patch
editKernelLocalversion "-dos.p1194"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -108,6 +108,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48953/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48956/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48959/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48961/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48970/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48971/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48977/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48981/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48982/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48986/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48987/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48993/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48995/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48997/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49000/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49006/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49013/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49014/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49017/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49019/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49022/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49023/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49025/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49028/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49030/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
@ -140,7 +190,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2124/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2156/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2163/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2166/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2176/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2235/^6.3/0001.patch
@ -198,7 +247,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-25775/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-26545/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28327/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28466/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30456/5.10/0002.patch
@ -414,6 +462,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52906/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52915/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0565/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch
@ -1053,7 +1102,85 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47671/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-selinux-rwx/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47684/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47710/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47713/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47716/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47718/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47735/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47740/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47742/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47745/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47756/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49851/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49858/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49863/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49868/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49878/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49879/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49884/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49889/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49890/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49892/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49895/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49907/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49913/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49930/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49933/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49936/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49945/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49977/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49983/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49985/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50001/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50033/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50039/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50046/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch
@ -1064,7 +1191,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p1064"
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49881/5.10/0002.patch
editKernelLocalversion "-dos.p1192"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -102,6 +102,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
@ -502,6 +504,41 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33063/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
@ -509,7 +546,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p509"
editKernelLocalversion "-dos.p546"
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -113,6 +113,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -490,6 +492,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -501,7 +529,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p501"
editKernelLocalversion "-dos.p529"
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -139,6 +139,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48949/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49023/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
@ -360,6 +367,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52915/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.19/0004.patch
@ -747,13 +755,51 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p753"
editKernelLocalversion "-dos.p799"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -211,6 +211,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -582,6 +603,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -589,7 +632,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p589"
editKernelLocalversion "-dos.p632"
else echo "kernel_google_wahoo is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -192,6 +192,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -562,11 +582,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p566"
editKernelLocalversion "-dos.p608"
else echo "kernel_lge_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -193,6 +193,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
@ -566,11 +587,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p570"
editKernelLocalversion "-dos.p613"
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -107,6 +107,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -496,6 +498,34 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -507,7 +537,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p507"
editKernelLocalversion "-dos.p537"
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -104,6 +104,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49023/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
@ -180,6 +183,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
@ -576,13 +580,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p582"
editKernelLocalversion "-dos.p629"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -679,6 +679,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48949/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48956/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48988/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
@ -1178,6 +1205,36 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1189,7 +1246,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p1189"
editKernelLocalversion "-dos.p1246"
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -105,6 +105,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
@ -150,6 +152,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch
@ -521,13 +524,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p527"
editKernelLocalversion "-dos.p573"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -59,11 +59,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48812/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48977/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/5.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2166/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch
@ -117,6 +119,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52882/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52887/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52889/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0841/5.4/0004.patch
@ -639,6 +642,60 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47668/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47671/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47684/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47710/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47716/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47756/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49851/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49892/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49945/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49985/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50033/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50039/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
@ -650,7 +707,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
editKernelLocalversion "-dos.p650"
editKernelLocalversion "-dos.p707"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -192,6 +192,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -562,11 +582,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p566"
editKernelLocalversion "-dos.p608"
else echo "kernel_razer_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -107,6 +107,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -492,6 +494,34 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -503,7 +533,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p503"
editKernelLocalversion "-dos.p533"
else echo "kernel_razer_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -746,6 +746,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -1093,6 +1117,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
@ -1101,7 +1148,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1101"
editKernelLocalversion "-dos.p1148"
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -208,6 +208,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -582,11 +603,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p586"
editKernelLocalversion "-dos.p629"
else echo "kernel_sony_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -606,6 +606,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
@ -986,6 +1010,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0004.patch
@ -1003,7 +1051,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p1003"
editKernelLocalversion "-dos.p1051"
else echo "kernel_sony_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -98,6 +98,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
@ -487,6 +489,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -498,7 +526,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p498"
editKernelLocalversion "-dos.p526"
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -109,6 +109,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -501,6 +503,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -512,7 +540,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch
editKernelLocalversion "-dos.p512"
editKernelLocalversion "-dos.p540"
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -109,6 +109,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
@ -538,6 +540,43 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33063/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
@ -545,7 +584,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p545"
editKernelLocalversion "-dos.p584"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -106,6 +106,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
@ -130,6 +132,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
@ -405,10 +408,54 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p408"
editKernelLocalversion "-dos.p455"
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -107,6 +107,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
@ -542,6 +544,43 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33063/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
@ -549,7 +588,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch
editKernelLocalversion "-dos.p549"
editKernelLocalversion "-dos.p588"
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -199,6 +199,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -574,12 +595,34 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p579"
editKernelLocalversion "-dos.p622"
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"