From b82427ce5b4060c6cf830f5058b03db3600c08bd Mon Sep 17 00:00:00 2001 From: Tad Date: Fri, 13 Jan 2023 13:48:52 -0500 Subject: [PATCH] Conservative reverse loose versioning for 3.10 This applies 3.4 patches to 3.10 if no other match is available Note: CVE-2017-13245/3.4/0002.patch ends up applied over CVE-2018-10902/3.18/0003.patch Signed-off-by: Tad --- .../android_kernel_htc_msm8994.sh | 31 ++++++++++++++- .../android_kernel_lge_msm8992.sh | 38 +++++++++++++++++-- .../android_kernel_motorola_msm8992.sh | 35 ++++++++++++++++- .../CVE_Patchers/android_kernel_asus_fugu.sh | 31 ++++++++++++++- .../android_kernel_asus_msm8916.sh | 29 +++++++++++++- .../android_kernel_htc_flounder.sh | 27 ++++++++++++- .../android_kernel_huawei_angler.sh | 33 +++++++++++++++- .../android_kernel_lge_bullhead.sh | 29 +++++++++++++- .../CVE_Patchers/android_kernel_moto_shamu.sh | 34 ++++++++++++++++- .../android_kernel_nextbit_msm8992.sh | 31 ++++++++++++++- .../android_kernel_cyanogen_msm8916.sh | 30 ++++++++++++++- .../android_kernel_google_yellowstone.sh | 28 +++++++++++++- .../android_kernel_samsung_apq8084.sh | 25 +++++++++++- .../android_kernel_cyanogen_msm8916.sh | 30 ++++++++++++++- .../android_kernel_motorola_msm8916.sh | 25 +++++++++++- .../android_kernel_motorola_msm8992.sh | 26 ++++++++++++- .../android_kernel_oneplus_msm8994.sh | 27 ++++++++++++- .../CVE_Patchers/android_kernel_moto_shamu.sh | 33 +++++++++++++++- .../android_kernel_nextbit_msm8992.sh | 32 +++++++++++++++- 19 files changed, 550 insertions(+), 24 deletions(-) diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh index bd3fed56..ea24e1cc 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh @@ -22,6 +22,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -94,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.10/0002.patch @@ -106,6 +113,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch @@ -182,6 +190,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch @@ -218,6 +227,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch @@ -253,6 +263,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch @@ -268,6 +279,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch @@ -282,7 +296,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch @@ -325,8 +338,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch @@ -345,6 +360,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -354,11 +370,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -493,6 +511,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -508,6 +527,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch @@ -518,10 +540,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p523" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p550" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh index a044b5c7..e8aa57f4 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh @@ -23,6 +23,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.10/0006.patch @@ -89,6 +95,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3135/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.10/0002.patch @@ -116,6 +123,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch @@ -129,6 +137,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9754/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch @@ -258,6 +267,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch @@ -305,6 +315,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch @@ -339,6 +350,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch @@ -353,6 +365,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch @@ -367,7 +382,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11266/ANY/0002.patch @@ -401,6 +415,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch @@ -412,8 +427,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/3.18/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch @@ -427,6 +444,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -436,11 +454,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -502,6 +522,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch @@ -565,6 +586,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30324/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch @@ -575,6 +597,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -590,6 +614,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch @@ -599,10 +627,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/^5.19/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p604" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p636" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh index e9869005..02e244ba 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8992.sh @@ -23,6 +23,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -89,11 +95,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6676/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6742/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6745/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6745/3.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6751/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6753/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8417/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8418/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8421/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 @@ -171,6 +181,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6424/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6426/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/3.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/3.10/0006.patch @@ -321,6 +332,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17760/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17769/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch @@ -369,10 +381,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5820/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5828/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5863/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5905/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch @@ -383,6 +397,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch @@ -412,6 +429,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11980/qcacld-2.0/0001.patch --directo git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch @@ -434,6 +452,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2297/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2299/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch @@ -446,8 +465,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10507/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10542/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch @@ -465,6 +486,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -474,11 +496,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -614,6 +638,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -629,6 +655,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch @@ -641,7 +671,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p643" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p676" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh index d3dd6f74..ec2fa3a6 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh @@ -17,6 +17,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch @@ -206,6 +207,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3135/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.10/0002.patch @@ -243,6 +245,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch @@ -303,6 +306,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13273/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch @@ -380,6 +384,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch @@ -398,7 +405,6 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch @@ -449,6 +455,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch @@ -457,11 +464,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -594,6 +603,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -608,6 +618,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch @@ -617,9 +631,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p621" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p648" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh index 49102b3f..f83a0a70 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh @@ -20,6 +20,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -38,6 +44,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch @@ -94,6 +101,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch @@ -121,6 +129,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5833/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch @@ -134,6 +143,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch @@ -160,6 +172,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11955/prima/0001.patch --directory=dr git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch @@ -192,8 +205,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10508/prima/0001.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch @@ -212,6 +227,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -221,11 +237,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -398,9 +416,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch @@ -413,7 +435,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p415" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p442" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh index 73ce882d..06325d20 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh @@ -16,11 +16,18 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8086/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9876/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0275/^4.0/0001.patch @@ -49,6 +56,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2188/3.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3135/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch @@ -69,6 +77,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch @@ -165,6 +174,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3561/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch @@ -199,6 +209,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch @@ -237,6 +248,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch @@ -245,11 +257,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -385,6 +399,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -400,6 +415,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch @@ -409,8 +428,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p412" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p437" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh index 73109ece..6ad46fc8 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh @@ -24,6 +24,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.10/0006.patch @@ -113,6 +119,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3135/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.10/0002.patch @@ -142,9 +149,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0002-merged.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6694/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6742/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6745/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6745/3.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8481/ANY/0001.patch @@ -159,6 +170,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch @@ -186,6 +198,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6426/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0002.patch @@ -269,6 +282,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch @@ -322,6 +336,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.10/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch @@ -333,6 +348,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch @@ -352,6 +368,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -361,11 +378,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -506,6 +525,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -521,6 +543,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch @@ -531,10 +557,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p536" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p567" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh index 1bb49507..2c7230eb 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh @@ -23,6 +23,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.10/0006.patch @@ -112,6 +118,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3135/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.10/0002.patch @@ -155,6 +162,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10235/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch @@ -182,6 +190,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6426/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0002.patch @@ -265,6 +274,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5863/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch @@ -327,6 +337,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2302/qcacld-2.0/0001.patch --director git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2307/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2310/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch @@ -341,6 +352,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10507/qcacld-2.0/0001.patch --directo git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10536/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10542/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch @@ -360,6 +372,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -369,11 +382,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -518,6 +533,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -533,7 +551,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch @@ -546,10 +568,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p551" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p578" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_moto_shamu.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_moto_shamu.sh index 35488408..9ecfed7f 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_moto_shamu.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_moto_shamu.sh @@ -16,6 +16,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -40,6 +46,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/3.18/0002.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2053/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3135/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch @@ -50,9 +57,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6136/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6742/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6745/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6745/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch @@ -66,6 +78,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0824/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.18/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6426/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch @@ -78,6 +91,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch @@ -128,18 +142,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2181/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch @@ -284,6 +303,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0065.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -299,8 +320,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch @@ -310,9 +335,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p314" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p346" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh index 838a628b..115dbefc 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh @@ -18,6 +18,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -37,7 +43,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch @@ -97,6 +105,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18056/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 @@ -137,6 +146,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5836/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5842/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5842/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5863/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 @@ -154,6 +164,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch @@ -188,6 +201,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13890/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch @@ -231,8 +245,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10542/qcacld-2.0/0001.patch --directo git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10566/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch @@ -251,6 +267,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -260,11 +277,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -406,6 +425,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -421,6 +442,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch @@ -433,7 +458,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p435" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p464" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh index 5183faa1..234b1d5f 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh @@ -20,6 +20,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -38,6 +44,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch @@ -90,6 +97,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch @@ -115,6 +123,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5833/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch @@ -129,6 +138,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9465/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch @@ -155,6 +167,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11955/prima/0001.patch --directory=dr git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch @@ -189,8 +202,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10508/prima/0001.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch @@ -209,6 +224,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -218,11 +234,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -380,6 +398,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0018.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0019.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -395,8 +414,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch @@ -409,7 +432,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p411" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p439" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh index adb122c2..f1d1f90d 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh @@ -17,6 +17,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -64,6 +70,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3134/3.10/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3135/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch @@ -102,6 +109,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch @@ -160,6 +168,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch @@ -240,13 +249,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch @@ -286,6 +295,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch @@ -294,11 +304,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -436,6 +448,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -452,6 +465,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch @@ -461,7 +478,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p463" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p487" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh index 6d4d4f92..6ce4fb55 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh @@ -16,6 +16,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch #git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -37,6 +43,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8466/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch @@ -49,6 +56,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13219/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch @@ -108,11 +116,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch @@ -171,6 +183,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/3.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch @@ -240,6 +253,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0065.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -255,7 +270,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch @@ -265,10 +284,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p270" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p293" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh index 5183faa1..234b1d5f 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh @@ -20,6 +20,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -38,6 +44,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch @@ -90,6 +97,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch @@ -115,6 +123,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5833/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch @@ -129,6 +138,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9465/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch @@ -155,6 +167,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11955/prima/0001.patch --directory=dr git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch @@ -189,8 +202,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10508/prima/0001.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch @@ -209,6 +224,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -218,11 +234,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -380,6 +398,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0018.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0019.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0040.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0041.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -395,8 +414,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch @@ -409,7 +432,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p411" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p439" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh index aafe16ec..257ab4ff 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh @@ -23,6 +23,13 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3227/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -143,6 +150,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/3.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch @@ -220,6 +228,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch @@ -242,6 +251,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14614/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch @@ -268,7 +278,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch @@ -287,11 +299,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -435,6 +449,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0018.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0020.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0043.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -449,10 +464,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0002.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch @@ -465,8 +484,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p468" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p491" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh index 1842dbb0..3bc149e2 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh @@ -17,6 +17,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -37,6 +43,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch @@ -99,6 +106,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5836/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5842/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5842/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5863/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 @@ -178,8 +186,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10542/qcacld-2.0/0001.patch --directo git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10566/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch @@ -198,6 +208,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -207,11 +218,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -353,6 +366,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -368,6 +383,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch @@ -380,7 +399,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p382" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p406" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh index b2db8224..d2408349 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh @@ -18,6 +18,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -37,7 +43,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch @@ -100,6 +108,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5836/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5842/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5842/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5863/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 @@ -179,8 +188,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10542/qcacld-2.0/0001.patch --directo git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10566/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch @@ -199,6 +210,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -208,11 +220,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -354,6 +368,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -369,6 +385,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch @@ -381,7 +401,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p383" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p408" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh index 22d9cb44..9e1b7db0 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh @@ -17,6 +17,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -42,6 +48,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/3.18/0002.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2053/3.18/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3135/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3865/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3894/ANY/0001.patch @@ -52,8 +59,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6136/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6695/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6742/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6745/3.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6745/3.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8404/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch @@ -66,6 +78,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.18/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6426/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch @@ -78,6 +91,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13245/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15845/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch @@ -127,17 +141,21 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch @@ -264,6 +282,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0065.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -278,8 +298,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/^6.1/0001.patch @@ -289,9 +313,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p293" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p324" cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh index 4574769f..7b6d0004 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh @@ -18,6 +18,12 @@ git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/00 git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-6540/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3222/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3225/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3228/3.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3231/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch @@ -37,7 +43,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8393/3.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch @@ -96,6 +104,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17762/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17770/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18056/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 @@ -136,6 +145,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5836/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5842/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5842/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5844/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5863/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 @@ -153,6 +163,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch @@ -186,6 +199,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13890/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch @@ -229,8 +243,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10542/qcacld-2.0/0001.patch --directo git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10566/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10580/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10626/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch @@ -249,6 +265,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch @@ -258,11 +275,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch @@ -400,6 +419,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0063.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -415,6 +437,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch @@ -427,7 +453,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/^6.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p429" +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch +editKernelLocalversion "-dos.p459" cd "$DOS_BUILD_BASE"