Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-05-26 22:50:14 -04:00
parent 028541103d
commit a136f27ae6
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
67 changed files with 83 additions and 133 deletions

@ -1 +1 @@
Subproject commit a4880eda7f83e2092422e2643bd96fb4f65ee2d5
Subproject commit 9658e29492e8ea573496cbc17ca93aa8035360c8

View File

@ -139,7 +139,7 @@ done
declare -a fourDotFour=("${threeDotEighteen[@]}" "android_kernel_essential_msm8998.sh" "android_kernel_fxtec_msm8998.sh" "android_kernel_lge_msm8996.sh" "android_kernel_zuk_msm8996.sh" "android_kernel_xiaomi_sdm660.sh" "android_kernel_sony_sdm660.sh" "android_kernel_razer_msm8998.sh" "android_kernel_oneplus_msm8998.sh" "android_kernel_google_wahoo.sh" "android_kernel_yandex_sdm660.sh" "android_kernel_zuk_msm8996.sh");
for script in "${fourDotFour[@]}"
do
commentPatches $script "CVE-2021-47006" "CVE-2021-47455" "CVE-2023-2513" "CVE-2023-4132";
commentPatches $script "CVE-2021-47006" "CVE-2021-47267" "CVE-2021-47455" "CVE-2023-2513" "CVE-2023-4132";
done
#4.9
declare -a fourDotNine=("${fourDotFour[@]}" "android_kernel_fairphone_sdm632.sh" "android_kernel_google_msm-4.9.sh" "android_kernel_oneplus_sdm845.sh" "android_kernel_razer_sdm845.sh" "android_kernel_samsung_exynos9810.sh" "android_kernel_samsung_universal9810.sh" "android_kernel_sony_sdm845.sh" "android_kernel_xiaomi_msm8937.sh" "android_kernel_xiaomi_sdm845.sh");

View File

@ -535,7 +535,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -621,7 +621,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -466,7 +466,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -730,7 +730,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47252/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47260/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
@ -968,7 +968,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -980,7 +979,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p980"
editKernelLocalversion "-dos.p979"
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -629,7 +629,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -414,7 +414,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -690,7 +690,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47252/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47260/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
@ -932,7 +932,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -946,7 +945,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p946"
editKernelLocalversion "-dos.p945"
else echo "kernel_google_dragon is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -425,7 +425,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -550,7 +550,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -558,7 +558,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -670,7 +670,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47252/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47260/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
@ -925,7 +925,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -936,7 +935,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p936"
editKernelLocalversion "-dos.p935"
else echo "kernel_zte_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -411,7 +411,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -362,7 +362,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47207/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch

View File

@ -474,7 +474,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -278,7 +278,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -411,7 +411,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -464,7 +464,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -393,7 +393,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -395,7 +395,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -770,13 +770,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p776"
editKernelLocalversion "-dos.p775"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -377,7 +377,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47252/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47254/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47260/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/4.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/4.4/0005.patch
@ -732,7 +732,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
@ -741,7 +740,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p741"
editKernelLocalversion "-dos.p740"
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -218,7 +218,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47207/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch

View File

@ -484,7 +484,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47252/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47260/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
@ -743,7 +743,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
@ -756,7 +755,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p756"
editKernelLocalversion "-dos.p755"
else echo "kernel_google_marlin is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -465,7 +465,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47207/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch

View File

@ -394,7 +394,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47207/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch

View File

@ -355,7 +355,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47207/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch

View File

@ -382,7 +382,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47207/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch

View File

@ -309,7 +309,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -448,7 +448,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47207/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch

View File

@ -501,7 +501,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47252/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47260/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
@ -760,7 +760,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -770,7 +769,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p770"
editKernelLocalversion "-dos.p769"
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -445,7 +445,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch

View File

@ -486,7 +486,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47252/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47260/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47277/3.18/0001.patch
@ -748,7 +748,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
@ -758,7 +757,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p758"
editKernelLocalversion "-dos.p757"
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -325,7 +325,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47207/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch

View File

@ -230,7 +230,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47207/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47236/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47249/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47250/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47269/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47276/3.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47284/3.18/0001.patch

View File

@ -65,7 +65,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
@ -389,12 +389,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p394"
editKernelLocalversion "-dos.p393"
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -854,7 +854,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -863,7 +862,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p863"
editKernelLocalversion "-dos.p862"
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -112,7 +112,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
@ -417,7 +417,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -425,7 +424,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p425"
editKernelLocalversion "-dos.p424"
else echo "kernel_essential_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -264,7 +264,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -272,7 +271,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p272"
editKernelLocalversion "-dos.p271"
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -131,7 +131,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52623/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52670/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52758/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52784/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
@ -277,13 +276,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p283"
editKernelLocalversion "-dos.p281"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -61,7 +61,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
@ -365,12 +365,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p370"
editKernelLocalversion "-dos.p369"
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -131,7 +131,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52623/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52670/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52758/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52784/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
@ -277,13 +276,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p283"
editKernelLocalversion "-dos.p281"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -307,7 +307,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52693/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52694/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52696/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52700/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52702/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52703/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52705/5.10/0005.patch
@ -328,7 +327,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52748/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52750/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52753/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52754/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52758/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52759/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52764/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
@ -643,7 +641,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36005/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36006/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36007/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36008/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -652,7 +649,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
editKernelLocalversion "-dos.p652"
editKernelLocalversion "-dos.p649"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -305,7 +305,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52693/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52694/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52696/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52700/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52702/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52703/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52705/5.10/0005.patch
@ -326,7 +325,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52748/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52750/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52753/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52754/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52758/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52759/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52764/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
@ -641,7 +639,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36005/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36006/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36007/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36008/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -650,7 +647,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
editKernelLocalversion "-dos.p650"
editKernelLocalversion "-dos.p647"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -218,11 +218,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p222"
editKernelLocalversion "-dos.p221"
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -268,7 +268,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -276,7 +275,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p276"
editKernelLocalversion "-dos.p275"
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -296,7 +296,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52742/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52746/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52747/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52753/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52758/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52759/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52764/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
@ -481,13 +480,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p487"
editKernelLocalversion "-dos.p485"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -83,7 +83,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
@ -382,7 +382,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -390,7 +389,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p390"
editKernelLocalversion "-dos.p389"
else echo "kernel_google_wahoo is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -61,7 +61,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
@ -365,12 +365,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p370"
editKernelLocalversion "-dos.p369"
else echo "kernel_lge_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -61,7 +61,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
@ -369,12 +369,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p374"
editKernelLocalversion "-dos.p373"
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -268,7 +268,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -276,7 +275,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p276"
editKernelLocalversion "-dos.p275"
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -157,7 +157,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52707/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52746/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52758/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52774/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52784/^6.6/0001.patch
@ -327,13 +326,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p333"
editKernelLocalversion "-dos.p331"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -821,7 +821,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -829,7 +828,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p829"
editKernelLocalversion "-dos.p828"
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -129,7 +129,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52623/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52670/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52758/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52784/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
@ -275,13 +274,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
editKernelLocalversion "-dos.p281"
editKernelLocalversion "-dos.p279"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -97,7 +97,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52656/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52670/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52699/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52758/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52879/5.4/0004.patch
@ -314,7 +313,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36006/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36007/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.4/0005.patch
@ -323,7 +321,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
editKernelLocalversion "-dos.p323"
editKernelLocalversion "-dos.p321"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -61,7 +61,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
@ -365,12 +365,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p370"
editKernelLocalversion "-dos.p369"
else echo "kernel_razer_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -267,7 +267,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -275,7 +274,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p275"
editKernelLocalversion "-dos.p274"
else echo "kernel_razer_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -855,14 +855,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p862"
editKernelLocalversion "-dos.p861"
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -68,7 +68,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
@ -382,12 +382,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p387"
editKernelLocalversion "-dos.p386"
else echo "kernel_sony_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -708,7 +708,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -718,7 +717,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p718"
editKernelLocalversion "-dos.p717"
else echo "kernel_sony_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -265,7 +265,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -273,7 +272,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p273"
editKernelLocalversion "-dos.p272"
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -271,7 +271,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -279,7 +278,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.p
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p279"
editKernelLocalversion "-dos.p278"
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -251,11 +251,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p255"
editKernelLocalversion "-dos.p254"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -111,7 +111,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52437/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52595/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52604/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52758/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52784/^6.6/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch
@ -162,9 +161,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
editKernelLocalversion "-dos.p164"
editKernelLocalversion "-dos.p162"
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -253,11 +253,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/^6.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/^6.8/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/^6.8/0002.patch
editKernelLocalversion "-dos.p257"
editKernelLocalversion "-dos.p256"
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -66,7 +66,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-46999/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47058/^5.12/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47103/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47267/4.9/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch
@ -380,13 +380,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36013/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p386"
editKernelLocalversion "-dos.p385"
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"