From b2eb3c01b428a119813fa4ceaa325a2b12a4f0d2 Mon Sep 17 00:00:00 2001 From: Tad Date: Tue, 3 May 2022 22:12:54 -0400 Subject: [PATCH] Update CVE patchers Newly added CVE-2022-20009 is dupe with CVE-2022-25258 and CVE-2022-25375 Signed-off-by: Tad --- Misc/Missing_CVEs.txt | 1 + Patches/Linux | 2 +- .../android_kernel_htc_msm8994.sh | 3 +- .../android_kernel_lge_msm8992.sh | 3 +- .../android_kernel_motorola_msm8992.sh | 3 +- .../android_kernel_samsung_universal8890.sh | 3 +- .../CVE_Patchers/android_kernel_asus_fugu.sh | 3 +- .../android_kernel_asus_msm8916.sh | 5 +- .../android_kernel_google_dragon.sh | 3 +- .../android_kernel_htc_flounder.sh | 3 +- .../android_kernel_huawei_angler.sh | 3 +- .../android_kernel_lge_bullhead.sh | 4 +- .../android_kernel_lge_msm8996.sh | 3 +- .../CVE_Patchers/android_kernel_moto_shamu.sh | 3 +- .../android_kernel_nextbit_msm8992.sh | 3 +- .../android_kernel_zte_msm8996.sh | 4 +- .../android_kernel_cyanogen_msm8916.sh | 5 +- .../android_kernel_cyanogen_msm8974.sh | 3 +- .../android_kernel_google_yellowstone.sh | 3 +- .../android_kernel_samsung_apq8084.sh | 3 +- .../android_kernel_xiaomi_msm8937.sh | 5 +- .../android_kernel_cyanogen_msm8916.sh | 5 +- .../android_kernel_motorola_msm8916.sh | 5 +- .../android_kernel_motorola_msm8992.sh | 3 +- .../android_kernel_motorola_msm8996.sh | 3 +- .../android_kernel_oneplus_msm8994.sh | 3 +- .../android_kernel_oneplus_sm7250.sh | 10 +- .../android_kernel_oneplus_sm8150.sh | 9 +- .../android_kernel_xiaomi_sm6150.sh | 9 +- .../android_kernel_yandex_sdm660.sh | 5 +- .../android_kernel_essential_msm8998.sh | 9 +- .../android_kernel_fairphone_msm8974.sh | 4 +- .../android_kernel_fairphone_sdm632.sh | 34 +-- .../android_kernel_google_marlin.sh | 4 +- .../android_kernel_google_msm-4.9.sh | 5 +- .../android_kernel_google_wahoo.sh | 9 +- .../android_kernel_htc_msm8974.sh | 3 +- .../CVE_Patchers/android_kernel_lge_g3.sh | 3 +- .../android_kernel_lge_msm8974.sh | 3 +- .../android_kernel_lge_msm8996.sh | 3 +- .../CVE_Patchers/android_kernel_moto_shamu.sh | 3 +- .../android_kernel_motorola_msm8974.sh | 3 +- .../android_kernel_nextbit_msm8992.sh | 3 +- .../android_kernel_oneplus_msm8996.sh | 5 +- .../android_kernel_oneplus_msm8998.sh | 10 +- .../android_kernel_oneplus_sdm845.sh | 199 +++++++++++++++++- .../android_kernel_oneplus_sm8150.sh | 10 +- .../android_kernel_oppo_msm8974.sh | 3 +- .../android_kernel_razer_msm8998.sh | 9 +- .../android_kernel_sony_sdm660.sh | 5 +- .../android_kernel_sony_sdm845.sh | 6 +- .../android_kernel_xiaomi_sdm660.sh | 9 +- .../android_kernel_xiaomi_sdm845.sh | 5 +- .../android_kernel_xiaomi_sm8150.sh | 10 +- .../android_kernel_xiaomi_sm8250.sh | 11 +- .../android_kernel_zuk_msm8996.sh | 7 +- Scripts/LineageOS-18.1/Functions.sh | 5 +- Scripts/LineageOS-18.1/Patch.sh | 6 +- .../android_kernel_essential_msm8998.sh | 9 +- .../android_kernel_fxtec_msm8998.sh | 9 +- .../android_kernel_google_msm-4.14.sh | 8 +- .../android_kernel_google_msm-4.9.sh | 10 +- .../android_kernel_google_redbull.sh | 12 +- .../android_kernel_google_wahoo.sh | 9 +- .../android_kernel_oneplus_msm8998.sh | 10 +- .../android_kernel_oneplus_sdm845.sh | 6 +- .../android_kernel_oneplus_sm8150.sh | 10 +- .../android_kernel_razer_msm8998.sh | 9 +- .../android_kernel_razer_sdm845.sh | 5 +- .../android_kernel_sony_sdm660.sh | 9 +- .../android_kernel_xiaomi_sdm845.sh | 5 +- 71 files changed, 441 insertions(+), 176 deletions(-) diff --git a/Misc/Missing_CVEs.txt b/Misc/Missing_CVEs.txt index 3496c032..97f9c9c9 100644 --- a/Misc/Missing_CVEs.txt +++ b/Misc/Missing_CVEs.txt @@ -26,6 +26,7 @@ https://nvd.nist.gov/vuln/detail/CVE-2020-27066 - no links https://nvd.nist.gov/vuln/detail/CVE-2020-3623 - no links https://nvd.nist.gov/vuln/detail/CVE-2020-3648 - vendor shenanigans https://nvd.nist.gov/vuln/detail/CVE-2021-39712 +https://nvd.nist.gov/vuln/detail/CVE-2022-20118 https://github.com/bobfuzzer/CVE diff --git a/Patches/Linux b/Patches/Linux index 014a03d2..055acc1d 160000 --- a/Patches/Linux +++ b/Patches/Linux @@ -1 +1 @@ -Subproject commit 014a03d2d4f0105990a45f07e31ba8ddae7a6372 +Subproject commit 055acc1d5806938552828d729bc0a48352b256f7 diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh index c4538403..fd0369f2 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh @@ -491,11 +491,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p497" +editKernelLocalversion "-dos.p498" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh index e85fa754..1472b42c 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh @@ -573,11 +573,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p579" +editKernelLocalversion "-dos.p580" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh index 46ebfb07..dc7eb9a5 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh @@ -613,8 +613,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p616" +editKernelLocalversion "-dos.p617" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh index cb943a96..be6a47c6 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh @@ -687,6 +687,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch @@ -702,5 +703,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p702" +editKernelLocalversion "-dos.p703" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh index a7b4f392..d0986774 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh @@ -592,10 +592,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p597" +editKernelLocalversion "-dos.p598" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh index 990ad7df..ff407365 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh @@ -382,8 +382,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p385" +editKernelLocalversion "-dos.p388" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh index a85308aa..a0d55960 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh @@ -647,6 +647,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch @@ -665,5 +666,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p665" +editKernelLocalversion "-dos.p666" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh index 21054d24..8dd103f1 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh @@ -383,9 +383,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p387" +editKernelLocalversion "-dos.p388" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh index 5598195e..5d4f2bbb 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh @@ -503,11 +503,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p509" +editKernelLocalversion "-dos.p510" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh index 71200c2d..d98520ef 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh @@ -515,11 +515,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p521" +editKernelLocalversion "-dos.p523" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8996.sh index 61a4bd9b..16a9c738 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8996.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8996.sh @@ -541,6 +541,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch @@ -555,5 +556,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p555" +editKernelLocalversion "-dos.p556" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_moto_shamu.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_moto_shamu.sh index 2425339c..5e6d7099 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_moto_shamu.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_moto_shamu.sh @@ -283,10 +283,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p288" +editKernelLocalversion "-dos.p289" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh index 7591ef0e..7b5f9ce6 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh @@ -405,8 +405,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p408" +editKernelLocalversion "-dos.p409" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh index a4e796ff..eecbcefe 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh @@ -630,6 +630,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch @@ -644,5 +646,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p644" +editKernelLocalversion "-dos.p646" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh index 48749733..9877e37d 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh @@ -379,8 +379,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p382" +editKernelLocalversion "-dos.p385" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh index 307556f3..08d0432a 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh @@ -358,6 +358,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -editKernelLocalversion "-dos.p359" +editKernelLocalversion "-dos.p360" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh index 0602022e..c090e9ad 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh @@ -435,8 +435,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p438" +editKernelLocalversion "-dos.p439" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh index 5b9e7c76..ee565c79 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh @@ -239,11 +239,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p245" +editKernelLocalversion "-dos.p246" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh index 11e5f7fb..ad3611a2 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh @@ -399,6 +399,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch @@ -414,5 +417,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p414" +editKernelLocalversion "-dos.p417" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh index 48749733..9877e37d 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh @@ -379,8 +379,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p382" +editKernelLocalversion "-dos.p385" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh index ae030c4c..5f70528d 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh @@ -432,9 +432,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0020.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p436" +editKernelLocalversion "-dos.p439" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh index f5bdb472..2ec49468 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh @@ -352,8 +352,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p355" +editKernelLocalversion "-dos.p356" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8996.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8996.sh index 8a5e86e2..7325946c 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8996.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8996.sh @@ -549,6 +549,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch @@ -563,5 +564,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p563" +editKernelLocalversion "-dos.p564" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh index 1b2232f0..2adc4752 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh @@ -353,8 +353,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p356" +editKernelLocalversion "-dos.p357" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh index 8147e727..af43a63d 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm7250.sh @@ -389,6 +389,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34556/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35039/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38199/4.19/0003.patch @@ -433,6 +434,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.19/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.19/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20008/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23041/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23041/4.19/0005.patch @@ -441,12 +446,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28389/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.19/0007.patch @@ -456,5 +460,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch -editKernelLocalversion "-dos.p456" +editKernelLocalversion "-dos.p460" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh index 5a0d1808..fa166825 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh @@ -437,6 +437,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/^5.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35105/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38199/4.14/0002.patch @@ -473,17 +474,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28389/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.14/0005.patch @@ -491,5 +494,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch -editKernelLocalversion "-dos.p491" +editKernelLocalversion "-dos.p494" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh index 5771e9d3..5c2b9fda 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh @@ -198,6 +198,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/^5.13/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35105/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.14/0002.patch @@ -237,21 +238,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28389/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch -editKernelLocalversion "-dos.p253" +editKernelLocalversion "-dos.p256" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh index a8a8f331..7874c203 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh @@ -321,12 +321,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -336,5 +337,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p336" +editKernelLocalversion "-dos.p337" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_essential_msm8998.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_essential_msm8998.sh index aee93655..a3cb4d21 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_essential_msm8998.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_essential_msm8998.sh @@ -101,9 +101,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch @@ -111,7 +113,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26490/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch @@ -119,5 +120,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p119" +editKernelLocalversion "-dos.p120" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh index 151778c1..9bae9660 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh @@ -208,6 +208,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0072.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -editKernelLocalversion "-dos.p209" +editKernelLocalversion "-dos.p211" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh index d464892d..ecfff478 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_sdm632.sh @@ -96,7 +96,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0020.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0021.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11272/prima/0002.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12655/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch @@ -115,7 +114,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/prima/0015.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch @@ -132,7 +130,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/prima/0009.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26555/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch @@ -141,8 +138,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch @@ -150,14 +145,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36516/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0929/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/^4.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch @@ -167,7 +160,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0941/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0036.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0037.patch @@ -191,10 +183,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0013.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.9/0005.patch @@ -238,7 +226,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.9/0007.patch @@ -246,28 +233,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38199/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.9/0005.patch @@ -282,27 +258,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0018.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0644/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0847/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -310,5 +282,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch -editKernelLocalversion "-dos.p310" +editKernelLocalversion "-dos.p282" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh index 195aed0e..3c21f050 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh @@ -443,6 +443,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch @@ -460,5 +462,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p460" +editKernelLocalversion "-dos.p462" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm-4.9.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm-4.9.sh index b522b59d..3d3c4202 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm-4.9.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm-4.9.sh @@ -226,6 +226,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch @@ -233,7 +235,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -242,5 +243,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch -editKernelLocalversion "-dos.p242" +editKernelLocalversion "-dos.p243" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_wahoo.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_wahoo.sh index c74933c4..0bf31429 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_wahoo.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_wahoo.sh @@ -70,9 +70,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch @@ -80,12 +82,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p87" +editKernelLocalversion "-dos.p88" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh index 43ee9ed3..14c8a2d5 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh @@ -459,6 +459,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -editKernelLocalversion "-dos.p460" +editKernelLocalversion "-dos.p461" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh index e3631e27..2b67f801 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh @@ -382,6 +382,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -editKernelLocalversion "-dos.p383" +editKernelLocalversion "-dos.p384" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh index b3c432d7..e88bd810 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh @@ -370,6 +370,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -editKernelLocalversion "-dos.p371" +editKernelLocalversion "-dos.p372" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8996.sh index 9fae583b..89772cc3 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8996.sh @@ -528,6 +528,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch @@ -542,5 +543,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p542" +editKernelLocalversion "-dos.p543" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh index 43fe3743..a11f7dcf 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh @@ -261,10 +261,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p266" +editKernelLocalversion "-dos.p267" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh index e7a321c8..35086578 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh @@ -440,7 +440,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -editKernelLocalversion "-dos.p442" +editKernelLocalversion "-dos.p443" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh index ac47a37d..d2c4f2d4 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh @@ -399,8 +399,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p402" +editKernelLocalversion "-dos.p403" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh index 9bf3f16a..bd7c2d45 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh @@ -445,6 +445,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch @@ -459,5 +462,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p459" +editKernelLocalversion "-dos.p462" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh index 49c9bc10..c35d68db 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh @@ -47,6 +47,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1941/qca-wifi-host-cmn/0001.patch --d git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1945/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch @@ -54,9 +55,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch @@ -64,12 +67,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p71" +editKernelLocalversion "-dos.p73" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh index 4cf483c9..f85545d0 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh @@ -1,7 +1,8 @@ #!/bin/bash cd "$DOS_BUILD_BASE""kernel/oneplus/sdm845" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0239-0240.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0286-0287.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0289-0290.patch --exclude=Makefile git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0300-0301.patch --exclude=Makefile git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/4.9/0010.patch git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch @@ -41,39 +42,161 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0031.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0032.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0033.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0034.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0035.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0022.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12655/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26555/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36516/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0929/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/^4.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0941/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0036.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0037.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0038.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0039.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0040.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0041.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0042.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0043.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0044.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0045.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0013.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0013.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.9/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.9/0023.patch @@ -81,54 +204,108 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4155/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.9/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28714/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35069/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35088/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35105/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38199/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0013.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43976/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0644/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0847/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1195/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1195/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p130" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch +editKernelLocalversion "-dos.p307" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh index 61b5cb21..a8b7c9c1 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh @@ -251,6 +251,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35069/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35088/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35105/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.14/0003.patch @@ -292,17 +294,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28389/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.14/0006.patch @@ -310,5 +314,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch -editKernelLocalversion "-dos.p310" +editKernelLocalversion "-dos.p314" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh index 24600f0f..8004489e 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh @@ -328,7 +328,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch -editKernelLocalversion "-dos.p330" +editKernelLocalversion "-dos.p331" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_razer_msm8998.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_razer_msm8998.sh index 9cf0c8c0..17552e0d 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_razer_msm8998.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_razer_msm8998.sh @@ -48,9 +48,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch @@ -58,12 +60,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p65" +editKernelLocalversion "-dos.p66" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm660.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm660.sh index def57be0..aa5fecb4 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm660.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm660.sh @@ -310,12 +310,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -325,5 +326,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p325" +editKernelLocalversion "-dos.p326" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm845.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm845.sh index 893fa180..12066ada 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm845.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_sony_sdm845.sh @@ -249,6 +249,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35105/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0008.patch @@ -290,13 +291,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -305,5 +307,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch -editKernelLocalversion "-dos.p305" +editKernelLocalversion "-dos.p307" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh index 4b7c0e2f..8d12697a 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh @@ -48,9 +48,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch @@ -58,12 +60,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p65" +editKernelLocalversion "-dos.p66" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm845.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm845.sh index 8903913d..33ef0ce0 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm845.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm845.sh @@ -1,5 +1,6 @@ #!/bin/bash cd "$DOS_BUILD_BASE""kernel/xiaomi/sdm845" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0311-0312.patch --exclude=Makefile git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0024.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch @@ -57,13 +58,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35105/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch -editKernelLocalversion "-dos.p65" +editKernelLocalversion "-dos.p68" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh index 38192abc..f05ab860 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh @@ -292,6 +292,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35069/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35088/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35105/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.14/0003.patch @@ -332,22 +334,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28389/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch -editKernelLocalversion "-dos.p349" +editKernelLocalversion "-dos.p353" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh index fa21bba6..689ef13a 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh @@ -324,6 +324,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35039/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35069/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35088/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.19/0003.patch @@ -374,6 +376,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.19/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.19/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20008/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23041/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23041/4.19/0005.patch @@ -382,12 +388,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28389/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.19/0007.patch @@ -396,5 +401,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch -editKernelLocalversion "-dos.p396" +editKernelLocalversion "-dos.p401" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_zuk_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_zuk_msm8996.sh index 3b1e32c9..c5e77e30 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_zuk_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_zuk_msm8996.sh @@ -311,12 +311,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -327,5 +330,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p327" +editKernelLocalversion "-dos.p330" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh index 5ebfc5b4..d3a71d7c 100644 --- a/Scripts/LineageOS-18.1/Functions.sh +++ b/Scripts/LineageOS-18.1/Functions.sh @@ -145,13 +145,12 @@ patchWorkspace() { touch DOS_PATCHED_FLAG; if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi; - #source build/envsetup.sh; + source build/envsetup.sh; #repopick -it eleven-firewall; #repopick -i 314130; #adbconnection: don't spin if adbd isn't running #repopick -i 314453; #TaskViewTouchController: Null check current animation on drag - #repopick -i 320663; #Trebuchet: Don't hide home screen rotation setting - #repopick -i 321297; #fs_mgr: Don't enable clean_scratch_files on non-dynamic devices #repopick -i 325011; #lineage: Opt-in to shipping full recovery image by default + repopick -it R_asb_2022-05; sh "$DOS_SCRIPTS/Patch.sh"; sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh"; diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh index c823d652..f3fbc817 100644 --- a/Scripts/LineageOS-18.1/Patch.sh +++ b/Scripts/LineageOS-18.1/Patch.sh @@ -549,9 +549,9 @@ if enterAndClear "kernel/google/wahoo"; then sed -i 's/asm(SET_PSTATE_UAO(1));/asm(SET_PSTATE_UAO(1)); return 0;/' arch/arm64/mm/fault.c; #fix build with CONFIG_ARM64_UAO fi; -if enterAndClear "kernel/oneplus/sdm845"; then -applyPatch "$DOS_PATCHES/android_kernel_oneplus_sdm845/4.9.282-qc.patch"; #4.9.227 -> 4.9.282 -fi; +#if enterAndClear "kernel/oneplus/sdm845"; then +#applyPatch "$DOS_PATCHES/android_kernel_oneplus_sdm845/4.9.282-qc.patch"; #4.9.227 -> 4.9.282 +#fi; #Make changes to all devices cd "$DOS_BUILD_BASE"; diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_essential_msm8998.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_essential_msm8998.sh index 61eb476c..e2caf70b 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_essential_msm8998.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_essential_msm8998.sh @@ -103,9 +103,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch @@ -113,7 +115,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26490/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch @@ -121,5 +122,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p121" +editKernelLocalversion "-dos.p122" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh index ae4e36d7..3fdb9976 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh @@ -50,9 +50,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch @@ -60,12 +62,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p67" +editKernelLocalversion "-dos.p68" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_msm-4.14.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_msm-4.14.sh index 34f6302c..bdd1ea1f 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_msm-4.14.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_msm-4.14.sh @@ -98,6 +98,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1195/^5.15/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1195/^5.15/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/^5.17/0001.patch @@ -105,14 +108,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28389/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.14/0006.patch -editKernelLocalversion "-dos.p114" +editKernelLocalversion "-dos.p116" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_msm-4.9.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_msm-4.9.sh index 1b39caef..48c5ff8e 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_msm-4.9.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_msm-4.9.sh @@ -1,6 +1,7 @@ #!/bin/bash cd "$DOS_BUILD_BASE""kernel/google/msm-4.9" git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0300-0301.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0311-0312.patch --exclude=Makefile git apply $DOS_PATCHES_LINUX_CVES/0005-Graphene-Deny_USB/4.9/0002.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0024.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch @@ -86,10 +87,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0847/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1195/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1195/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1195/4.9/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1195/4.9/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch @@ -100,12 +103,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p107" +editKernelLocalversion "-dos.p109" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_redbull.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_redbull.sh index 33302e09..3f1cb22b 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_redbull.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_redbull.sh @@ -3,6 +3,7 @@ cd "$DOS_BUILD_BASE""kernel/google/redbull" git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0224-0225.patch --exclude=Makefile git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0226-0227.patch --exclude=Makefile git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0228-0229.patch --exclude=Makefile +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0238-0239.patch --exclude=Makefile git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0087.patch @@ -85,10 +86,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0847/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0886/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1195/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1195/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20008/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.19/0002.patch @@ -101,14 +104,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28389/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.19/0005.patch -editKernelLocalversion "-dos.p110" +editKernelLocalversion "-dos.p112" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_wahoo.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_wahoo.sh index 95eb3269..936b5c1b 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_wahoo.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_google_wahoo.sh @@ -72,9 +72,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch @@ -82,12 +84,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p89" +editKernelLocalversion "-dos.p90" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh index 58d37896..409be326 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_msm8998.sh @@ -48,6 +48,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1941/qca-wifi-host-cmn/0001.patch --d git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1945/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-41864/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch @@ -57,9 +58,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch @@ -67,12 +70,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p74" +editKernelLocalversion "-dos.p76" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh index e2f4108b..1cb6076f 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_sdm845.sh @@ -246,6 +246,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.9/0005.patch @@ -286,13 +287,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/4.9/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -300,5 +302,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch -editKernelLocalversion "-dos.p300" +editKernelLocalversion "-dos.p302" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh index 61b5cb21..a8b7c9c1 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_oneplus_sm8150.sh @@ -251,6 +251,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35069/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35085/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35088/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35105/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.14/0003.patch @@ -292,17 +294,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28389/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.14/0006.patch @@ -310,5 +314,5 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch -editKernelLocalversion "-dos.p310" +editKernelLocalversion "-dos.p314" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_msm8998.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_msm8998.sh index 8fb05248..8556f95d 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_msm8998.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_msm8998.sh @@ -49,9 +49,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch @@ -59,12 +61,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p66" +editKernelLocalversion "-dos.p67" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_sdm845.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_sdm845.sh index 803d714f..d918e06a 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_sdm845.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_razer_sdm845.sh @@ -1,5 +1,6 @@ #!/bin/bash cd "$DOS_BUILD_BASE""kernel/razer/sdm845" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0311-0312.patch --exclude=Makefile git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0024.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch @@ -57,12 +58,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch -editKernelLocalversion "-dos.p64" +editKernelLocalversion "-dos.p67" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh index f4a13968..0a66de04 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh @@ -53,9 +53,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch @@ -63,12 +65,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p70" +editKernelLocalversion "-dos.p71" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sdm845.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sdm845.sh index 73031609..9360a12d 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sdm845.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sdm845.sh @@ -1,5 +1,6 @@ #!/bin/bash cd "$DOS_BUILD_BASE""kernel/xiaomi/sdm845" +git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0311-0312.patch --exclude=Makefile git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0024.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch @@ -57,12 +58,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35084/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.9/0007.patch -editKernelLocalversion "-dos.p64" +editKernelLocalversion "-dos.p67" cd "$DOS_BUILD_BASE"