diff --git a/Logs/resetWorkspace-LineageOS-19.1.txt b/Logs/resetWorkspace-LineageOS-19.1.txt index 28f602a4..eb8cdd2f 100644 --- a/Logs/resetWorkspace-LineageOS-19.1.txt +++ b/Logs/resetWorkspace-LineageOS-19.1.txt @@ -798,7 +798,7 @@ kernel/xiaomi/sm8150 950783ac4623027778367cb8f8c6c24f17e88dd9 libcore 3d79b82fa5058fadc5c9696811b38a48cb5eddbb libnativehelper 4127df85264539c1fcc6dcbf59410e9edaa2e0c6 lineage-sdk d4565e22e04e8030ac8d8551dfe11a868b8366a9 -lineage/scripts 888f78428b586276ee08d9aa3122174a8792c767 +lineage/scripts 8310968012dc4a227a066d7937568cb8a62b4314 packages/apps/AudioFX 2c1be3c3b062e397bfd1e780ddb0bae1f99c1b84 packages/apps/Backgrounds f778988c6b8d36e87399b5678239d4f696e4cab2 packages/apps/BasicSmsReceiver 7c6a070c68413bab5343043af3df220226759568 diff --git a/Logs/resetWorkspace-LineageOS-20.0.txt b/Logs/resetWorkspace-LineageOS-20.0.txt index de8d3bf6..32b4d024 100644 --- a/Logs/resetWorkspace-LineageOS-20.0.txt +++ b/Logs/resetWorkspace-LineageOS-20.0.txt @@ -6,7 +6,7 @@ bootable/recovery 4c1835f494be558f71c84e3abceb3d773f6c6369 build/bazel 9898ac01c9525bf91d23a1c2b83fc401603cb6d3 build/bazel_common_rules f6cf03f7d0ba2e7cb05c0109a5cd57aae07dc6e8 build/blueprint ca8f0e8e3571c866d69d34cbd47b3989abe8e8cd -build/make 2bc8b8d55c629a34e2237d7d11283370e6c99fad +build/make 171c37a6b454de91adfe66c8e0e1734e17362a2c build/pesto d554620e6f7ad178b71ebb8c4269830cbd24ad8c build/soong c80e6e3b82f2c0fded69b44b514d4c4d5519c9b5 cts 5f6e2dedd307f20dcf663ae17ab5db8664092430 @@ -802,7 +802,7 @@ external/zstd e6a035a8df42f375160f2acabe3caa283a0184d7 external/zucchini 11a3a4cd409d6e0f4ccfcfb97cc962eeaeddde00 external/zxing 248d7c742809ce1cbde1c4e6163d347e1feb274b frameworks/av 17fdb80d01ef17849c4d4e1100d05d29977117b2 -frameworks/base 372c4384dd8b995cc06a4459d3dfa70ac9603565 +frameworks/base 4bb2fcc853d835cd96c3f65b61c58f6e907dfd75 frameworks/compile/libbcc 81c07084cca2a6feab53eeb022f5d5a3ab5c10c5 frameworks/compile/mclinker 18374a53dc8e00ec3667b4e1a257c9b4e41f007f frameworks/compile/slang 1738348ca3d011f3f340883bd48e03a8e6aeb143 @@ -1027,10 +1027,10 @@ kernel/xiaomi/sm6150 749a9b6f6704202e61dea9981435107356db3cae kernel/xiaomi/sm8250 f3d39dae3253e7f8bb623eb83a146088f3174148 kernel/xiaomi/vayu 6c9febddfbd505b760d12f585288cf7612ad57d8 kernel/zuk/msm8996 cc57cb4ee3b7918b74d30604735d353b9a5fa23b -libcore 2a7d66adbcde1862f9295ae0a13f1751b193e4d7 +libcore 59b2cb7f0c05106805a1a762d9271162d51f82d4 libnativehelper 49ecc5f1e97e810d27e2c6558abdde49e875349b lineage-sdk 0b740679650b887691ac72462705913b7017ec26 -lineage/scripts 888f78428b586276ee08d9aa3122174a8792c767 +lineage/scripts 8310968012dc4a227a066d7937568cb8a62b4314 packages/apps/Aperture 1f91156b065e90d067136f5c2f8a635069605024 packages/apps/AudioFX 15e2a666d21551698ea0744996abcdc35e6c0cc1 packages/apps/Backgrounds 8600246ca64332e9cac3993c172ceef80cf3cc74 @@ -1090,7 +1090,7 @@ packages/apps/RemoteProvisioner 06d16c8031ce54bff1a07cc64f8b02140a3753c1 packages/apps/SafetyRegulatoryInfo f5dfd6ab7ea6aaa1a0014106110733e316379e95 packages/apps/SecureElement 7e9d165899058103fa612ffb41858e4fd975182b packages/apps/Seedvault e03ad756817631611b7497d9fe7b2173e2756b9d -packages/apps/Settings 6eeb7082ba8fad775706a58711c0de881e284163 +packages/apps/Settings 833a569dded0730edcee952721e6d172cba23a4f packages/apps/SettingsIntelligence 4ef92f41721f25bbdec5c0b2433547ef323e72ac packages/apps/SetupWizard 86046a3a2e3f0c127c45132ede75c9f10a1377af packages/apps/SimpleDeviceConfig 82d31b18dd2550e05f89248f128cb571eecc863a @@ -1116,7 +1116,7 @@ packages/inputmethods/LeanbackIME 945d4dc0f957bd3538a286b41babd93002d93d5c packages/modules/AdServices cf7fdc79568f5adb4028e9339bea92429d109cb7 packages/modules/AppSearch 5afd5a663c198a6b83ce8b4c49ae40903afae022 packages/modules/ArtPrebuilt 2363a7573c76c3731c66f36a858ab7811e373b1a -packages/modules/Bluetooth e9534a1a3e0a5e17fc449ffc54d911c4a8535d56 +packages/modules/Bluetooth bf8e72c9d2291a8dcb989734cd745fd26874dde5 packages/modules/BootPrebuilt/5.10/arm64 95cfa206c00dd5fcc72991f80ddfe383e76095ad packages/modules/BootPrebuilt/5.4/arm64 3130a05a2f71e6c43892db92148956af0b05a406 packages/modules/CaptivePortalLogin 1c4915e0f233b0f2ed7883bbb193df3980a72fc5 diff --git a/Patches/Linux b/Patches/Linux index de5c4408..74c6d717 160000 --- a/Patches/Linux +++ b/Patches/Linux @@ -1 +1 @@ -Subproject commit de5c44087270023dc15431b9a8ba124713c4af5c +Subproject commit 74c6d717f6e5f36645a06eef425c0a00a8dec144 diff --git a/PrebuiltApps b/PrebuiltApps index 77eb4d2c..6570e666 160000 --- a/PrebuiltApps +++ b/PrebuiltApps @@ -1 +1 @@ -Subproject commit 77eb4d2c11397b255977f66242090478f09e2e1a +Subproject commit 6570e6668fe3fe163cd713d4cc37343e74637ac1 diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh index b4b8ef33..9149cffd 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh @@ -827,6 +827,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -963,6 +969,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch @@ -975,7 +991,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p975" +editKernelLocalversion "-dos.p991" else echo "kernel_amazon_hdx-common is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh index 0ea91535..66e2c369 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh @@ -492,6 +492,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch @@ -628,6 +634,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -636,7 +652,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p636" +editKernelLocalversion "-dos.p652" else echo "kernel_asus_grouper is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh index 51c1446a..46ed8f7b 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh @@ -528,6 +528,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch @@ -664,6 +670,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch @@ -673,7 +689,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p673" +editKernelLocalversion "-dos.p689" else echo "kernel_htc_msm8960 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh index e93a5333..5dc1697a 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh @@ -616,6 +616,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -804,6 +811,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch @@ -816,7 +835,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p816" +editKernelLocalversion "-dos.p835" else echo "kernel_htc_msm8994 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh index efe6c789..364798f9 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh @@ -703,6 +703,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -889,6 +896,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch @@ -900,7 +919,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p900" +editKernelLocalversion "-dos.p919" else echo "kernel_lge_msm8992 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8952.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8952.sh index 8fac6838..3be52ff3 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8952.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8952.sh @@ -565,6 +565,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch @@ -756,6 +763,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -765,7 +784,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p765" +editKernelLocalversion "-dos.p784" else echo "kernel_motorola_msm8952 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh index 16403b0c..c2c0e473 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh @@ -603,6 +603,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch @@ -739,6 +745,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch @@ -748,7 +764,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p748" +editKernelLocalversion "-dos.p764" else echo "kernel_samsung_d2 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh index a89188f0..c0cb9d0f 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh @@ -287,6 +287,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48804/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch @@ -425,11 +431,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p429" +editKernelLocalversion "-dos.p445" else echo "kernel_samsung_exynos5420 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh index 562f8461..8c4be3e8 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh @@ -406,6 +406,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch @@ -543,6 +549,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -550,7 +566,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p550" +editKernelLocalversion "-dos.p566" else echo "kernel_samsung_manta is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh index 05c7cff0..baddf2c6 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh @@ -442,6 +442,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch @@ -553,6 +556,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -561,7 +571,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p561" +editKernelLocalversion "-dos.p571" else echo "kernel_samsung_smdk4412 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh index 37eba066..d743eec4 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh @@ -435,6 +435,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch @@ -543,6 +546,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46781/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -551,7 +561,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p551" +editKernelLocalversion "-dos.p561" else echo "kernel_samsung_tuna is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh index db81cde7..2ed4b9df 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh @@ -863,6 +863,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch @@ -1107,6 +1120,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch @@ -1118,7 +1148,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p1118" +editKernelLocalversion "-dos.p1148" else echo "kernel_samsung_universal8890 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh index a14b95ea..1f503b64 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh @@ -709,6 +709,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch @@ -893,6 +900,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch @@ -911,7 +933,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p911" +editKernelLocalversion "-dos.p933" else echo "kernel_asus_fugu is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh index 24b3b23d..06d92c50 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh @@ -513,6 +513,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch @@ -705,6 +712,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -715,7 +734,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p715" +editKernelLocalversion "-dos.p734" else echo "kernel_asus_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh index 0a465d3c..a6f8928a 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh @@ -826,6 +826,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch @@ -1075,6 +1090,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch @@ -1088,7 +1120,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p1088" +editKernelLocalversion "-dos.p1120" else echo "kernel_google_dragon is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh index 346f4313..8e6c7444 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh @@ -508,6 +508,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -699,6 +706,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch @@ -710,7 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p710" +editKernelLocalversion "-dos.p732" else echo "kernel_htc_flounder is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh index 7695d48b..4e2fe3bd 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh @@ -635,6 +635,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -823,6 +830,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch @@ -835,7 +857,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p835" +editKernelLocalversion "-dos.p857" else echo "kernel_huawei_angler is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh index 8c56852b..48d9896a 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh @@ -646,6 +646,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -834,6 +841,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch @@ -846,7 +868,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p846" +editKernelLocalversion "-dos.p868" else echo "kernel_lge_bullhead is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh index 1f22f3a4..8f499f73 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh @@ -812,6 +812,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch @@ -1070,6 +1083,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch @@ -1080,7 +1110,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p1080" +editKernelLocalversion "-dos.p1110" else echo "kernel_zte_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh index a6a70689..bf9ca69e 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh @@ -510,6 +510,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch @@ -703,6 +710,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -713,7 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p713" +editKernelLocalversion "-dos.p732" else echo "kernel_cyanogen_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh index 565b4716..e78e0082 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh @@ -454,6 +454,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch @@ -593,6 +599,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -600,7 +616,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p600" +editKernelLocalversion "-dos.p616" else echo "kernel_cyanogen_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh index 385873b3..46b6799b 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh @@ -559,6 +559,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch @@ -749,6 +756,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -759,7 +781,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p759" +editKernelLocalversion "-dos.p781" else echo "kernel_google_yellowstone is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh index f51261b9..23fb8612 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh @@ -364,6 +364,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch @@ -554,6 +561,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch @@ -566,7 +585,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p566" +editKernelLocalversion "-dos.p585" else echo "kernel_samsung_apq8084 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh index a6a70689..bf9ca69e 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh @@ -510,6 +510,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch @@ -703,6 +710,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -713,7 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p713" +editKernelLocalversion "-dos.p732" else echo "kernel_cyanogen_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh index fd624871..b74dc821 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh @@ -560,6 +560,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -747,6 +754,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch @@ -756,7 +776,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p756" +editKernelLocalversion "-dos.p776" else echo "kernel_motorola_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh index 130100d2..9fef58be 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh @@ -480,6 +480,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -671,6 +678,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -680,7 +699,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p680" +editKernelLocalversion "-dos.p699" else echo "kernel_motorola_msm8992 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh index 0fd0a5d3..8c7cc8d7 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh @@ -482,6 +482,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -673,6 +680,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -682,7 +701,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p682" +editKernelLocalversion "-dos.p701" else echo "kernel_oneplus_msm8994 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh index cca51003..7f4e06cd 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh @@ -644,6 +644,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48949/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48956/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48988/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch @@ -1141,6 +1168,36 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch @@ -1148,7 +1205,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch -editKernelLocalversion "-dos.p1148" +editKernelLocalversion "-dos.p1205" else echo "kernel_xiaomi_sm6150 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh index 2b4d586e..b452aa64 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh @@ -583,6 +583,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -944,6 +963,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch @@ -952,7 +992,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p952" +editKernelLocalversion "-dos.p992" else echo "kernel_yandex_sdm660 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh index c10b7a03..c4e622cc 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh @@ -276,6 +276,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch @@ -407,10 +413,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p410" +editKernelLocalversion "-dos.p426" else echo "kernel_fairphone_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh index 142ca4ab..136ad0e0 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh @@ -626,6 +626,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch @@ -881,6 +894,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch @@ -893,7 +924,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p893" +editKernelLocalversion "-dos.p924" else echo "kernel_google_marlin is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh index 810c9f89..34a55602 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh @@ -449,6 +449,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch @@ -584,6 +590,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch @@ -594,7 +610,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p594" +editKernelLocalversion "-dos.p610" else echo "kernel_google_msm is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh index b14405b9..a2d330d8 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh @@ -555,6 +555,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch @@ -694,6 +700,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch @@ -704,7 +720,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p704" +editKernelLocalversion "-dos.p720" else echo "kernel_htc_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh index 8610ff10..986fba29 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh @@ -483,6 +483,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -621,6 +627,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -628,7 +644,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p628" +editKernelLocalversion "-dos.p644" else echo "kernel_lge_g3 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh index 7a7e4415..c9144966 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh @@ -422,6 +422,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch @@ -558,6 +564,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -566,7 +582,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p566" +editKernelLocalversion "-dos.p582" else echo "kernel_lge_hammerhead is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh index a1117c80..1b5c134d 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh @@ -76,6 +76,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/^6.3/0002.patch @@ -201,10 +207,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p204" +editKernelLocalversion "-dos.p220" else echo "kernel_lge_mako is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh index a98cfc71..62df264f 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh @@ -468,6 +468,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch @@ -606,13 +612,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p612" +editKernelLocalversion "-dos.p628" else echo "kernel_lge_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh index e239ceda..ab8cc351 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh @@ -396,6 +396,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -590,6 +597,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch @@ -603,7 +622,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p603" +editKernelLocalversion "-dos.p622" else echo "kernel_moto_shamu is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh index 8a59c92f..8f3941df 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh @@ -536,6 +536,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -675,6 +681,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -683,7 +699,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p683" +editKernelLocalversion "-dos.p699" else echo "kernel_motorola_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh index 72ea8db9..44fe9448 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh @@ -643,6 +643,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch @@ -906,6 +919,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch @@ -915,7 +946,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p915" +editKernelLocalversion "-dos.p946" else echo "kernel_motorola_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh index 7ccac53a..0ff97370 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh @@ -533,6 +533,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch @@ -723,6 +730,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -732,7 +751,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p732" +editKernelLocalversion "-dos.p751" else echo "kernel_nextbit_msm8992 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh index 2e6d2781..f81c2e04 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh @@ -631,6 +631,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch @@ -894,6 +907,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49975/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch @@ -903,7 +934,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p903" +editKernelLocalversion "-dos.p934" else echo "kernel_oneplus_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh index d7f7f54d..36e8846a 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh @@ -411,6 +411,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -549,11 +555,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p553" +editKernelLocalversion "-dos.p569" else echo "kernel_oppo_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh index bdf9433f..6f5deccb 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh @@ -486,6 +486,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch @@ -622,6 +628,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch @@ -632,7 +648,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p632" +editKernelLocalversion "-dos.p648" else echo "kernel_samsung_jf is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh index 7631f8f3..1068645c 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh @@ -568,6 +568,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch @@ -704,6 +710,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch @@ -716,7 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p716" +editKernelLocalversion "-dos.p732" else echo "kernel_samsung_msm8930-common is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh index 7ae5387a..36fbf299 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh @@ -297,6 +297,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -435,10 +441,20 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p438" +editKernelLocalversion "-dos.p454" else echo "kernel_samsung_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh index e573a4c0..427a9286 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh @@ -207,6 +207,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch @@ -586,11 +607,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p590" +editKernelLocalversion "-dos.p632" else echo "kernel_xiaomi_sdm660 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh index 55de94b9..08a4ee68 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh @@ -723,6 +723,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48949/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48956/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48988/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch @@ -1223,6 +1250,36 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch @@ -1235,7 +1292,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch -editKernelLocalversion "-dos.p1235" +editKernelLocalversion "-dos.p1292" else echo "kernel_xiaomi_sm8150 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh index c8b0100c..4c0bd881 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh @@ -242,6 +242,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -608,6 +629,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch @@ -615,7 +658,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p615" +editKernelLocalversion "-dos.p658" else echo "kernel_essential_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh index 29f179e0..e71ccc17 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh @@ -102,6 +102,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch @@ -484,6 +486,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -495,7 +523,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-alt/4.9/0001.patch -editKernelLocalversion "-dos.p495" +editKernelLocalversion "-dos.p523" else echo "kernel_fairphone_sdm632 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh index b8892199..569f27d6 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh @@ -104,6 +104,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch @@ -149,6 +151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch @@ -520,13 +523,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch -editKernelLocalversion "-dos.p526" +editKernelLocalversion "-dos.p572" else echo "kernel_fairphone_sm7225 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh index b66cc46a..04945cf3 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh @@ -192,6 +192,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -562,11 +582,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p566" +editKernelLocalversion "-dos.p608" else echo "kernel_fxtec_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh index c82ba8b5..00b8b247 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh @@ -104,6 +104,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch @@ -149,6 +151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch @@ -520,13 +523,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch -editKernelLocalversion "-dos.p526" +editKernelLocalversion "-dos.p572" else echo "kernel_fxtec_sm6115 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh index 818dcf2a..0b8b58d7 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh @@ -108,6 +108,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48953/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48956/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48959/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48961/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48970/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48971/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48977/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48981/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48982/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48986/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48987/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48993/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48995/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48997/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49000/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49006/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49013/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49014/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49017/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49019/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49022/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49023/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49025/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49028/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49030/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/5.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch @@ -140,7 +190,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2124/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2156/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2163/5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2166/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2176/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2235/^6.3/0001.patch @@ -200,7 +249,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-25775/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-26545/5.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28327/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/5.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28466/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30456/5.10/0002.patch @@ -416,6 +464,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52906/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52915/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0565/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch @@ -1055,7 +1104,85 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47671/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/5.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-selinux-rwx/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47684/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47710/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47713/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47716/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47718/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47735/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47740/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47742/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47745/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47756/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49851/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49858/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49863/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49868/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49878/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49879/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49884/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49889/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49890/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49892/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49895/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49907/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49913/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49930/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49933/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49936/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49945/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49977/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49983/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49985/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50001/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50033/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50039/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50046/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch @@ -1066,7 +1193,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch -editKernelLocalversion "-dos.p1066" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49881/5.10/0002.patch +editKernelLocalversion "-dos.p1194" else echo "kernel_google_gs101_private_gs-google is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh index 427c37a8..cef71e11 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh @@ -108,6 +108,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48953/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48956/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48959/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48961/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48970/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48971/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48977/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48981/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48982/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48986/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48987/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48993/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48995/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48997/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49000/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49006/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49013/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49014/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49017/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49019/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49022/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49023/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49025/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49028/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/5.10/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49030/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/5.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch @@ -140,7 +190,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2124/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2156/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2163/5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2166/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2176/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2235/^6.3/0001.patch @@ -198,7 +247,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-25775/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-26545/5.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28327/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/5.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28466/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30456/5.10/0002.patch @@ -414,6 +462,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52906/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52915/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0565/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.10/0003.patch @@ -1053,7 +1102,85 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47671/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47672/5.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-selinux-rwx/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47684/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47710/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47713/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47716/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47718/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47735/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47740/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47742/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47745/5.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47756/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49851/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49858/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49863/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49867/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49868/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49878/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49879/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49884/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49889/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49890/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49892/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49895/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49907/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49913/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49930/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49933/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49936/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49945/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49949/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49957/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49977/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49983/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49985/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50001/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50033/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50039/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50046/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch @@ -1064,7 +1191,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch -editKernelLocalversion "-dos.p1064" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49881/5.10/0002.patch +editKernelLocalversion "-dos.p1192" else echo "kernel_google_gs201_private_gs-google is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh index f759fb37..85d7a7c4 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh @@ -102,6 +102,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch @@ -502,6 +504,41 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33063/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch @@ -509,7 +546,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch -editKernelLocalversion "-dos.p509" +editKernelLocalversion "-dos.p546" else echo "kernel_google_msm-4.14 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh index 6169f9e1..cccd76d1 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh @@ -113,6 +113,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch @@ -490,6 +492,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -501,7 +529,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch -editKernelLocalversion "-dos.p501" +editKernelLocalversion "-dos.p529" else echo "kernel_google_msm-4.9 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh index 5d560f28..a341cc4e 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh @@ -139,6 +139,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48949/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49023/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch @@ -360,6 +367,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52907/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52915/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.19/0004.patch @@ -747,13 +755,51 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch -editKernelLocalversion "-dos.p753" +editKernelLocalversion "-dos.p799" else echo "kernel_google_redbull is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh index 85de3c01..66a2cd78 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh @@ -211,6 +211,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -582,6 +603,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch @@ -589,7 +632,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p589" +editKernelLocalversion "-dos.p632" else echo "kernel_google_wahoo is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_lge_msm8996.sh index 0ec2f3a1..b1778a4f 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_lge_msm8996.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_lge_msm8996.sh @@ -192,6 +192,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -562,11 +582,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p566" +editKernelLocalversion "-dos.p608" else echo "kernel_lge_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh index 08d424dd..29918df5 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh @@ -193,6 +193,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch @@ -566,11 +587,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p570" +editKernelLocalversion "-dos.p613" else echo "kernel_oneplus_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh index f24a8aef..77c22adc 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh @@ -107,6 +107,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch @@ -496,6 +498,34 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -507,7 +537,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch -editKernelLocalversion "-dos.p507" +editKernelLocalversion "-dos.p537" else echo "kernel_oneplus_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh index 2a0725a2..3aae0f91 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh @@ -104,6 +104,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49023/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch @@ -180,6 +183,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52881/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch @@ -576,13 +580,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch -editKernelLocalversion "-dos.p582" +editKernelLocalversion "-dos.p629" else echo "kernel_oneplus_sm7250 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh index 4176f14c..3508196e 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh @@ -679,6 +679,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48949/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48956/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48988/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch @@ -1178,6 +1205,36 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch @@ -1189,7 +1246,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch -editKernelLocalversion "-dos.p1189" +editKernelLocalversion "-dos.p1246" else echo "kernel_oneplus_sm8150 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh index ac30e9d1..3adc5ecc 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh @@ -105,6 +105,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch @@ -150,6 +152,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.19/0002.patch @@ -521,13 +524,56 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch -editKernelLocalversion "-dos.p527" +editKernelLocalversion "-dos.p573" else echo "kernel_oneplus_sm8250 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh index c9925b16..8026b596 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh @@ -59,11 +59,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48812/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/5.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48977/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/5.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2166/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch @@ -117,6 +119,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52882/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52887/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52889/5.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0607/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0841/5.4/0004.patch @@ -639,6 +642,60 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47668/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47671/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47684/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47710/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47716/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47756/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49851/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49892/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49945/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49952/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49985/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50033/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50039/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch @@ -650,7 +707,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch -editKernelLocalversion "-dos.p650" +editKernelLocalversion "-dos.p707" else echo "kernel_oneplus_sm8350 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh index eadbb2f3..0d0d2ff8 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh @@ -192,6 +192,26 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -562,11 +582,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p566" +editKernelLocalversion "-dos.p608" else echo "kernel_razer_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh index dd650838..7b198cb8 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh @@ -107,6 +107,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch @@ -492,6 +494,34 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -503,7 +533,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch -editKernelLocalversion "-dos.p503" +editKernelLocalversion "-dos.p533" else echo "kernel_razer_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh index ef428cc5..61726774 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh @@ -746,6 +746,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch @@ -1093,6 +1117,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch @@ -1101,7 +1148,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch -editKernelLocalversion "-dos.p1101" +editKernelLocalversion "-dos.p1148" else echo "kernel_samsung_exynos9810 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm660.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm660.sh index 7da1fcbe..627b0f57 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm660.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm660.sh @@ -208,6 +208,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -582,11 +603,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p586" +editKernelLocalversion "-dos.p629" else echo "kernel_sony_sdm660 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh index 19ea260b..8c4f65ad 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh @@ -606,6 +606,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48962/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49021/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49031/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49032/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch @@ -986,6 +1010,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0004.patch @@ -1003,7 +1051,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch -editKernelLocalversion "-dos.p1003" +editKernelLocalversion "-dos.p1051" else echo "kernel_sony_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh index 51eaf662..9ef7a82d 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh @@ -98,6 +98,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch @@ -487,6 +489,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -498,7 +526,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch -editKernelLocalversion "-dos.p498" +editKernelLocalversion "-dos.p526" else echo "kernel_xiaomi_msm8937 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh index 2d81cf5e..48a60ee0 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh @@ -109,6 +109,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch @@ -501,6 +503,32 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46830/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -512,7 +540,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.9/0009.patch -editKernelLocalversion "-dos.p512" +editKernelLocalversion "-dos.p540" else echo "kernel_xiaomi_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh index 195cccf4..cab98f18 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh @@ -109,6 +109,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch @@ -538,6 +540,43 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33063/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch @@ -545,7 +584,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch -editKernelLocalversion "-dos.p545" +editKernelLocalversion "-dos.p584" else echo "kernel_xiaomi_sm6150 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh index ff7a95d7..dbf25d60 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh @@ -106,6 +106,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48955/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch @@ -130,6 +132,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52803/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52917/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23848/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch @@ -405,10 +408,54 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46854/^6.11/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47699/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47749/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49855/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49894/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49896/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49944/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49982/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch -editKernelLocalversion "-dos.p408" +editKernelLocalversion "-dos.p455" else echo "kernel_xiaomi_sm8250 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_vayu.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_vayu.sh index 1a5f0e56..a5dc8c14 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_vayu.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_vayu.sh @@ -107,6 +107,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48966/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch @@ -542,6 +544,43 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46840/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47677/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47685/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47696/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47698/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47706/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47723/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49902/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49938/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49958/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49966/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49981/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49997/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50013/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50019/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50045/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-33063/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch @@ -549,7 +588,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43047-upstream/4.14/0007.patch -editKernelLocalversion "-dos.p549" +editKernelLocalversion "-dos.p588" else echo "kernel_xiaomi_vayu is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh index 1cbf3963..7e858a86 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh @@ -199,6 +199,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48945/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48946/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48948/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48951/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48958/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48960/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48967/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48969/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48972/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48973/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48978/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48992/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48994/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49002/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49005/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49007/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49010/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49011/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49015/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49020/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49029/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-49033/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -574,12 +595,34 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46844/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47659/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47669/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47670/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47679/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47697/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47709/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47737/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47747/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-47757/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49860/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49877/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49882/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49883/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49900/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49903/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49924/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49948/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49959/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49963/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49965/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-49967/^6.11/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50024/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50035/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50040/^6.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-50044/^6.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p579" +editKernelLocalversion "-dos.p622" else echo "kernel_zuk_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE"