Update CVE patchers

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-08-22 12:42:37 -04:00
parent 09b570fa5d
commit b40a1f97d4
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
84 changed files with 369 additions and 100 deletions

View File

@ -68,7 +68,7 @@ external/caliper 4a0d9aba0856d0aa965d5653bfa4c138f0e8a8ba
external/cblas d063db8bdddfcde61e4bad3bfe65941fd73e8094 external/cblas d063db8bdddfcde61e4bad3bfe65941fd73e8094
external/chromium-libpac 0ac78251d11006d764ba1aad8cc0867827fafe5c external/chromium-libpac 0ac78251d11006d764ba1aad8cc0867827fafe5c
external/chromium-trace 8b2c0074e71a8086dee98ca8730acfdc5eddf7a1 external/chromium-trace 8b2c0074e71a8086dee98ca8730acfdc5eddf7a1
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994 external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
external/clang 751a76679b0fb5798ea6cab75906df07edcab315 external/clang 751a76679b0fb5798ea6cab75906df07edcab315
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4 external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
external/compiler-rt 0c46c9e892a3f68420635032ef2f6152dabd197c external/compiler-rt 0c46c9e892a3f68420635032ef2f6152dabd197c

View File

@ -67,7 +67,7 @@ external/capstone 6788a4139092f179005f7cdbf181ba24b60b6113
external/cblas ddf5f49cb53866fbc503a6349bf44bac24a6963d external/cblas ddf5f49cb53866fbc503a6349bf44bac24a6963d
external/chromium-libpac dff5ddb8d28f6ac9a86eb28763b4313f6f72eec5 external/chromium-libpac dff5ddb8d28f6ac9a86eb28763b4313f6f72eec5
external/chromium-trace b2cf025c7d5cebd43084f38c6c7ff9cc17da428a external/chromium-trace b2cf025c7d5cebd43084f38c6c7ff9cc17da428a
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994 external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
external/clang f9d2af42fc6d74c28893af371e4647158eaba66c external/clang f9d2af42fc6d74c28893af371e4647158eaba66c
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4 external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4
external/cn-cbor 7fe9f01990a97be4df5e46d2decd894c06678072 external/cn-cbor 7fe9f01990a97be4df5e46d2decd894c06678072

View File

@ -78,7 +78,7 @@ external/catch2 bcfbb791d09e390fb545c03ca002e570f764d960
external/cblas 61ee00692011385347a5dd1ad872556899a5cf7a external/cblas 61ee00692011385347a5dd1ad872556899a5cf7a
external/chromium-libpac c98fc96035e6fdc5b84d953d2bd38d2dcd175467 external/chromium-libpac c98fc96035e6fdc5b84d953d2bd38d2dcd175467
external/chromium-trace f4e722b911fcc6f7164026432de62a02ea3460fb external/chromium-trace f4e722b911fcc6f7164026432de62a02ea3460fb
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994 external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
external/clang 8343f599c9e1dda8e6c1bb779af323a673a052f9 external/clang 8343f599c9e1dda8e6c1bb779af323a673a052f9
external/cldr 4e0bdd442c1e01f5c6147cf6032ce4f8587f4ede external/cldr 4e0bdd442c1e01f5c6147cf6032ce4f8587f4ede
external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4 external/cmockery 9199c7bfafefea32d1884182fa655b6e4578c1c4

View File

@ -135,7 +135,7 @@ external/cblas d82c5f4ae14b2a5468303985070f7dadc15d4094
external/cbor-java f81e576298790c97498311e99a0b0b34653c3dd8 external/cbor-java f81e576298790c97498311e99a0b0b34653c3dd8
external/chromium-libpac 169c93e00a00605346a68d39d3f4713735bdb61e external/chromium-libpac 169c93e00a00605346a68d39d3f4713735bdb61e
external/chromium-trace e524766cad26d677a9a1ec8c00c512d4cac2cf5e external/chromium-trace e524766cad26d677a9a1ec8c00c512d4cac2cf5e
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994 external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
external/clang 0a1c53a5d295109bd4702ad13c0f2a5510ca1b26 external/clang 0a1c53a5d295109bd4702ad13c0f2a5510ca1b26
external/cldr 38850463abd624d5b2293be75fddc43cf6b55ae2 external/cldr 38850463abd624d5b2293be75fddc43cf6b55ae2
external/cn-cbor 696530332036f5518681d3c450cdbc3ee412004a external/cn-cbor 696530332036f5518681d3c450cdbc3ee412004a

View File

@ -94,7 +94,7 @@ external/catch2 2b2e0e9540defee10f28ea0fc97750490fa238b5
external/cblas 2b24922070cb6d45edd5f5b533db0637099a2b17 external/cblas 2b24922070cb6d45edd5f5b533db0637099a2b17
external/cbor-java 00c4a382dd3810f9c1b363eaad339cff34a3f6fe external/cbor-java 00c4a382dd3810f9c1b363eaad339cff34a3f6fe
external/chromium-trace 138ade68f9d3388a1b0a6d9ce5e091ff6f7e7448 external/chromium-trace 138ade68f9d3388a1b0a6d9ce5e091ff6f7e7448
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994 external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
external/clang f1cef8e77ae220c9379303bdc9896e0c2366bd6f external/clang f1cef8e77ae220c9379303bdc9896e0c2366bd6f
external/cldr 242ecd0dcb21f3376f825119ec0b36fcb15e7bb8 external/cldr 242ecd0dcb21f3376f825119ec0b36fcb15e7bb8
external/cn-cbor 6a0f6a5375b8cd9b495e91c11d21ed257ec9a905 external/cn-cbor 6a0f6a5375b8cd9b495e91c11d21ed257ec9a905

View File

@ -201,7 +201,7 @@ external/catch2 5f8628024c5a9219caa004d6a9547aacd9ba94c1
external/cblas 4fdeda64177f60e1b226349885b3c0ea016f3068 external/cblas 4fdeda64177f60e1b226349885b3c0ea016f3068
external/cbor-java 6b4b6adc5ff8f91e2ddef14adf510e14aaf90204 external/cbor-java 6b4b6adc5ff8f91e2ddef14adf510e14aaf90204
external/chromium-trace 9456b95a6d4b95c765c9f2264a71b0334f6cf8d7 external/chromium-trace 9456b95a6d4b95c765c9f2264a71b0334f6cf8d7
external/chromium-webview 99a6a0f38fd57d191ffd5f4a10985ecd3bd05994 external/chromium-webview 9e7b7b2d84d0b2ec2a171be87d8f19737718ffa2
external/clang 9fae335badf26813486d207b69928d38b979e522 external/clang 9fae335badf26813486d207b69928d38b979e522
external/cldr 7518f37169bd87d6977244e4d7471bc48fcd62e0 external/cldr 7518f37169bd87d6977244e4d7471bc48fcd62e0
external/cn-cbor 7b581886d1830f50c3ab104a56b7ab931779466f external/cn-cbor 7b581886d1830f50c3ab104a56b7ab931779466f

@ -1 +1 @@
Subproject commit 9936c5ee212b6731141d455b7e9f41de6459e883 Subproject commit 87c55be52883b283286903659828a5b969c49596

View File

@ -826,6 +826,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
@ -960,7 +961,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p960" editKernelLocalversion "-dos.p961"
else echo "kernel_amazon_hdx-common is unavailable, not patching."; else echo "kernel_amazon_hdx-common is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -491,6 +491,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -620,7 +621,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p620" editKernelLocalversion "-dos.p621"
else echo "kernel_asus_grouper is unavailable, not patching."; else echo "kernel_asus_grouper is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -527,6 +527,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -658,7 +659,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p658" editKernelLocalversion "-dos.p659"
else echo "kernel_htc_msm8960 is unavailable, not patching."; else echo "kernel_htc_msm8960 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -614,6 +614,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -793,7 +795,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p793" editKernelLocalversion "-dos.p795"
else echo "kernel_htc_msm8994 is unavailable, not patching."; else echo "kernel_htc_msm8994 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -701,6 +701,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -877,7 +879,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p877" editKernelLocalversion "-dos.p879"
else echo "kernel_lge_msm8992 is unavailable, not patching."; else echo "kernel_lge_msm8992 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -563,6 +563,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
@ -742,7 +744,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p742" editKernelLocalversion "-dos.p744"
else echo "kernel_motorola_msm8952 is unavailable, not patching."; else echo "kernel_motorola_msm8952 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -602,6 +602,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -733,7 +734,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p733" editKernelLocalversion "-dos.p734"
else echo "kernel_samsung_d2 is unavailable, not patching."; else echo "kernel_samsung_d2 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -286,6 +286,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48804/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48804/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -413,7 +414,7 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-sy
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p413" editKernelLocalversion "-dos.p414"
else echo "kernel_samsung_exynos5420 is unavailable, not patching."; else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -405,6 +405,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -534,7 +535,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p534" editKernelLocalversion "-dos.p535"
else echo "kernel_samsung_manta is unavailable, not patching."; else echo "kernel_samsung_manta is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -441,6 +441,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -549,7 +550,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p549" editKernelLocalversion "-dos.p550"
else echo "kernel_samsung_smdk4412 is unavailable, not patching."; else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -434,6 +434,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -539,7 +540,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p539" editKernelLocalversion "-dos.p540"
else echo "kernel_samsung_tuna is unavailable, not patching."; else echo "kernel_samsung_tuna is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -858,6 +858,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48851/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
@ -935,7 +939,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.4/0001.patch
@ -1084,7 +1087,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1084" editKernelLocalversion "-dos.p1087"
else echo "kernel_samsung_universal8890 is unavailable, not patching."; else echo "kernel_samsung_universal8890 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -708,6 +708,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
@ -889,7 +890,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p889" editKernelLocalversion "-dos.p890"
else echo "kernel_asus_fugu is unavailable, not patching."; else echo "kernel_asus_fugu is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -511,6 +511,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -692,7 +694,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p692" editKernelLocalversion "-dos.p694"
else echo "kernel_asus_msm8916 is unavailable, not patching."; else echo "kernel_asus_msm8916 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -820,6 +820,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48851/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch
@ -901,7 +906,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.4/0008.patch
@ -1053,7 +1057,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1053" editKernelLocalversion "-dos.p1057"
else echo "kernel_google_dragon is unavailable, not patching."; else echo "kernel_google_dragon is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -506,6 +506,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -686,7 +688,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p686" editKernelLocalversion "-dos.p688"
else echo "kernel_htc_flounder is unavailable, not patching."; else echo "kernel_htc_flounder is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -633,6 +633,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -813,7 +815,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p813" editKernelLocalversion "-dos.p815"
else echo "kernel_huawei_angler is unavailable, not patching."; else echo "kernel_huawei_angler is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -644,6 +644,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -824,7 +826,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p824" editKernelLocalversion "-dos.p826"
else echo "kernel_lge_bullhead is unavailable, not patching."; else echo "kernel_lge_bullhead is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -807,6 +807,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
@ -892,7 +896,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch
@ -1044,7 +1047,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1044" editKernelLocalversion "-dos.p1047"
else echo "kernel_zte_msm8996 is unavailable, not patching."; else echo "kernel_zte_msm8996 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -508,6 +508,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -690,7 +692,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p690" editKernelLocalversion "-dos.p692"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching."; else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -453,6 +453,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
@ -585,7 +586,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p585" editKernelLocalversion "-dos.p586"
else echo "kernel_cyanogen_msm8974 is unavailable, not patching."; else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -557,6 +557,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
@ -735,7 +737,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p735" editKernelLocalversion "-dos.p737"
else echo "kernel_google_yellowstone is unavailable, not patching."; else echo "kernel_google_yellowstone is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -362,6 +362,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -543,7 +545,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p543" editKernelLocalversion "-dos.p545"
else echo "kernel_samsung_apq8084 is unavailable, not patching."; else echo "kernel_samsung_apq8084 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -508,6 +508,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -690,7 +692,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p690" editKernelLocalversion "-dos.p692"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching."; else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -559,6 +559,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48702/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -734,7 +735,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p734" editKernelLocalversion "-dos.p735"
else echo "kernel_motorola_msm8916 is unavailable, not patching."; else echo "kernel_motorola_msm8916 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -478,6 +478,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -657,7 +659,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p657" editKernelLocalversion "-dos.p659"
else echo "kernel_motorola_msm8992 is unavailable, not patching."; else echo "kernel_motorola_msm8992 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -480,6 +480,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -659,7 +661,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p659" editKernelLocalversion "-dos.p661"
else echo "kernel_oneplus_msm8994 is unavailable, not patching."; else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -613,6 +613,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48912/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48924/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
@ -1049,6 +1060,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
@ -1056,7 +1068,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1056" editKernelLocalversion "-dos.p1068"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching."; else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -564,6 +564,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -686,7 +694,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
@ -885,7 +892,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p885" editKernelLocalversion "-dos.p892"
else echo "kernel_yandex_sdm660 is unavailable, not patching."; else echo "kernel_yandex_sdm660 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -275,6 +275,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
@ -395,7 +396,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p395" editKernelLocalversion "-dos.p396"
else echo "kernel_fairphone_msm8974 is unavailable, not patching."; else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -621,6 +621,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48851/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
@ -705,7 +709,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
@ -860,7 +863,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p860" editKernelLocalversion "-dos.p863"
else echo "kernel_google_marlin is unavailable, not patching."; else echo "kernel_google_marlin is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -448,6 +448,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -579,7 +580,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p579" editKernelLocalversion "-dos.p580"
else echo "kernel_google_msm is unavailable, not patching."; else echo "kernel_google_msm is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -554,6 +554,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
@ -689,7 +690,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p689" editKernelLocalversion "-dos.p690"
else echo "kernel_htc_msm8974 is unavailable, not patching."; else echo "kernel_htc_msm8974 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -482,6 +482,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
@ -613,7 +614,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p613" editKernelLocalversion "-dos.p614"
else echo "kernel_lge_g3 is unavailable, not patching."; else echo "kernel_lge_g3 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -421,6 +421,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -551,7 +552,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p551" editKernelLocalversion "-dos.p552"
else echo "kernel_lge_hammerhead is unavailable, not patching."; else echo "kernel_lge_hammerhead is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -75,6 +75,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/^6.3/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/^6.3/0002.patch
@ -189,7 +190,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p189" editKernelLocalversion "-dos.p190"
else echo "kernel_lge_mako is unavailable, not patching."; else echo "kernel_lge_mako is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -467,6 +467,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0003.patch
@ -597,7 +598,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p597" editKernelLocalversion "-dos.p598"
else echo "kernel_lge_msm8974 is unavailable, not patching."; else echo "kernel_lge_msm8974 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -394,6 +394,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -581,7 +583,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p581" editKernelLocalversion "-dos.p583"
else echo "kernel_moto_shamu is unavailable, not patching."; else echo "kernel_moto_shamu is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -535,6 +535,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
@ -668,7 +669,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p668" editKernelLocalversion "-dos.p669"
else echo "kernel_motorola_msm8974 is unavailable, not patching."; else echo "kernel_motorola_msm8974 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -638,6 +638,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
@ -724,7 +728,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
@ -879,7 +882,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p879" editKernelLocalversion "-dos.p882"
else echo "kernel_motorola_msm8996 is unavailable, not patching."; else echo "kernel_motorola_msm8996 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -531,6 +531,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48757/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
@ -709,7 +711,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p709" editKernelLocalversion "-dos.p711"
else echo "kernel_nextbit_msm8992 is unavailable, not patching."; else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -626,6 +626,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.4/0007.patch
@ -712,7 +716,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52880/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-21468/ANY/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-22099/4.4/0008.patch
@ -867,7 +870,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p867" editKernelLocalversion "-dos.p870"
else echo "kernel_oneplus_msm8996 is unavailable, not patching."; else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -410,6 +410,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
@ -538,7 +539,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p538" editKernelLocalversion "-dos.p539"
else echo "kernel_oppo_msm8974 is unavailable, not patching."; else echo "kernel_oppo_msm8974 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -485,6 +485,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -617,7 +618,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p617" editKernelLocalversion "-dos.p618"
else echo "kernel_samsung_jf is unavailable, not patching."; else echo "kernel_samsung_jf is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -567,6 +567,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch
@ -701,7 +702,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p701" editKernelLocalversion "-dos.p702"
else echo "kernel_samsung_msm8930-common is unavailable, not patching."; else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -296,6 +296,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48710/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48795/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch
@ -423,7 +424,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p423" editKernelLocalversion "-dos.p424"
else echo "kernel_samsung_msm8974 is unavailable, not patching."; else echo "kernel_samsung_msm8974 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -194,6 +194,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
@ -319,7 +327,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
@ -527,7 +534,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p527" editKernelLocalversion "-dos.p534"
else echo "kernel_xiaomi_sdm660 is unavailable, not patching."; else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -693,6 +693,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48912/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48924/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
@ -1128,6 +1139,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1138,7 +1151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1138" editKernelLocalversion "-dos.p1151"
else echo "kernel_xiaomi_sm8150 is unavailable, not patching."; else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -231,6 +231,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -351,7 +359,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.4/0008.patch
@ -555,7 +562,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p555" editKernelLocalversion "-dos.p562"
else echo "kernel_essential_msm8998 is unavailable, not patching."; else echo "kernel_essential_msm8998 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -100,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -436,6 +437,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -445,7 +447,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p445" editKernelLocalversion "-dos.p447"
else echo "kernel_fairphone_sdm632 is unavailable, not patching."; else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -98,6 +98,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
@ -440,13 +443,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p446" editKernelLocalversion "-dos.p451"
else echo "kernel_fairphone_sm7225 is unavailable, not patching."; else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -180,6 +180,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -296,7 +304,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
@ -505,7 +512,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p505" editKernelLocalversion "-dos.p512"
else echo "kernel_fxtec_msm8998 is unavailable, not patching."; else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -98,6 +98,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
@ -440,13 +443,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p446" editKernelLocalversion "-dos.p451"
else echo "kernel_fxtec_sm6115 is unavailable, not patching."; else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -95,14 +95,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48828/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48871/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48871/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48872/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48872/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48873/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48873/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48875/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48878/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48878/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48893/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48894/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48894/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
@ -924,6 +927,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43849/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43867/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -933,7 +940,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p933" editKernelLocalversion "-dos.p940"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching."; else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -95,14 +95,17 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48828/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48871/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48871/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48872/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48872/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48873/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48873/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48875/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48878/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48878/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48893/^5.18/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48894/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48894/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48896/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48898/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48899/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48916/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch
@ -922,6 +925,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43849/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43867/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
@ -931,7 +938,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p931" editKernelLocalversion "-dos.p938"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching."; else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -95,6 +95,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48671/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch
@ -437,12 +439,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p442" editKernelLocalversion "-dos.p446"
else echo "kernel_google_msm-4.14 is unavailable, not patching."; else echo "kernel_google_msm-4.14 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -105,6 +105,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -435,6 +436,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -444,7 +446,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p444" editKernelLocalversion "-dos.p446"
else echo "kernel_google_msm-4.9 is unavailable, not patching."; else echo "kernel_google_msm-4.9 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -134,6 +134,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
@ -653,13 +654,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p659" editKernelLocalversion "-dos.p662"
else echo "kernel_google_redbull is unavailable, not patching."; else echo "kernel_google_redbull is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -195,6 +195,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -316,7 +324,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-1086/4.4/0008.patch
@ -524,7 +531,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p524" editKernelLocalversion "-dos.p531"
else echo "kernel_google_wahoo is unavailable, not patching."; else echo "kernel_google_wahoo is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -180,6 +180,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -296,7 +304,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
@ -505,7 +512,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p505" editKernelLocalversion "-dos.p512"
else echo "kernel_lge_msm8996 is unavailable, not patching."; else echo "kernel_lge_msm8996 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -181,6 +181,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
@ -299,7 +307,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
@ -509,7 +516,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p509" editKernelLocalversion "-dos.p516"
else echo "kernel_oneplus_msm8998 is unavailable, not patching."; else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -100,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -442,6 +443,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -451,7 +453,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p451" editKernelLocalversion "-dos.p453"
else echo "kernel_oneplus_sdm845 is unavailable, not patching."; else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -95,6 +95,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48797/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48797/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
@ -492,13 +495,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p498" editKernelLocalversion "-dos.p503"
else echo "kernel_oneplus_sm7250 is unavailable, not patching."; else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -660,6 +660,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48912/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48924/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0266/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
@ -1094,6 +1104,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1103,7 +1115,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1103" editKernelLocalversion "-dos.p1115"
else echo "kernel_oneplus_sm8150 is unavailable, not patching."; else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -96,6 +96,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48663/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
@ -438,13 +441,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p444" editKernelLocalversion "-dos.p449"
else echo "kernel_oneplus_sm8250 is unavailable, not patching."; else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -58,6 +58,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48812/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48812/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/^5.15/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
@ -536,6 +537,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43846/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43867/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43880/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
@ -546,7 +551,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
editKernelLocalversion "-dos.p546" editKernelLocalversion "-dos.p551"
else echo "kernel_oneplus_sm8350 is unavailable, not patching."; else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -180,6 +180,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -296,7 +304,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
@ -505,7 +512,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p505" editKernelLocalversion "-dos.p512"
else echo "kernel_razer_msm8998 is unavailable, not patching."; else echo "kernel_razer_msm8998 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -100,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -438,6 +439,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -447,7 +449,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p447" editKernelLocalversion "-dos.p449"
else echo "kernel_razer_sdm845 is unavailable, not patching."; else echo "kernel_razer_sdm845 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -736,6 +736,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -1047,6 +1055,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
@ -1055,7 +1064,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p1055" editKernelLocalversion "-dos.p1064"
else echo "kernel_samsung_exynos9810 is unavailable, not patching."; else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -191,6 +191,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -315,7 +323,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
@ -520,7 +527,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p520" editKernelLocalversion "-dos.p527"
else echo "kernel_sony_sdm660 is unavailable, not patching."; else echo "kernel_sony_sdm660 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -579,6 +579,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48910/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.9/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
@ -914,6 +923,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -925,7 +935,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p925" editKernelLocalversion "-dos.p935"
else echo "kernel_sony_sdm845 is unavailable, not patching."; else echo "kernel_sony_sdm845 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -96,6 +96,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
@ -435,6 +436,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -444,7 +446,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p444" editKernelLocalversion "-dos.p446"
else echo "kernel_xiaomi_msm8937 is unavailable, not patching."; else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -102,6 +102,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48672/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch
@ -445,6 +446,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -454,7 +456,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p454" editKernelLocalversion "-dos.p456"
else echo "kernel_xiaomi_sdm845 is unavailable, not patching."; else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -103,6 +103,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48671/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
@ -474,12 +476,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p479" editKernelLocalversion "-dos.p483"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching."; else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -98,6 +98,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48674/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48785/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48920/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48935/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0005.patch
@ -322,10 +325,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p325" editKernelLocalversion "-dos.p330"
else echo "kernel_xiaomi_sm8250 is unavailable, not patching."; else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -101,6 +101,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48671/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48825/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48914/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48938/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0590/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.14/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch
@ -476,12 +478,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p481" editKernelLocalversion "-dos.p485"
else echo "kernel_xiaomi_vayu is unavailable, not patching."; else echo "kernel_xiaomi_vayu is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"

View File

@ -190,6 +190,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48857/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48860/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48877/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48891/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48908/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48911/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48917/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48919/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48928/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48930/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48931/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48936/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch
@ -310,7 +318,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52884/^6.5/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52893/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52894/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52900/4.4/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52901/^6.2/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0340/^6.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0639/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-0775/4.4/0001.patch
@ -521,7 +528,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directo
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p521" editKernelLocalversion "-dos.p528"
else echo "kernel_zuk_msm8996 is unavailable, not patching."; else echo "kernel_zuk_msm8996 is unavailable, not patching.";
fi; fi;
cd "$DOS_BUILD_BASE" cd "$DOS_BUILD_BASE"