Update CVE patchers

Signed-off-by: Tavi <tavi@divested.dev>
This commit is contained in:
Tavi 2024-09-16 09:50:36 -04:00
parent bdcde818b9
commit b8a754c18c
No known key found for this signature in database
GPG Key ID: E599F62ECBAEAF2E
80 changed files with 409 additions and 114 deletions

View File

@ -94,7 +94,7 @@ external/catch2 2b2e0e9540defee10f28ea0fc97750490fa238b5
external/cblas 2b24922070cb6d45edd5f5b533db0637099a2b17
external/cbor-java 00c4a382dd3810f9c1b363eaad339cff34a3f6fe
external/chromium-trace 138ade68f9d3388a1b0a6d9ce5e091ff6f7e7448
external/chromium-webview b270aa98312408d5893ee72fcd62b4d89937ceb2
external/chromium-webview 8400ae9b819741cd4d436cce372496426ec85fc9
external/clang f1cef8e77ae220c9379303bdc9896e0c2366bd6f
external/cldr 242ecd0dcb21f3376f825119ec0b36fcb15e7bb8
external/cn-cbor 6a0f6a5375b8cd9b495e91c11d21ed257ec9a905

View File

@ -6,7 +6,7 @@ bootable/recovery 4c1835f494be558f71c84e3abceb3d773f6c6369
build/bazel 9898ac01c9525bf91d23a1c2b83fc401603cb6d3
build/bazel_common_rules f6cf03f7d0ba2e7cb05c0109a5cd57aae07dc6e8
build/blueprint ca8f0e8e3571c866d69d34cbd47b3989abe8e8cd
build/make a5c8915ab48dc2734442c426e935004099f046e0
build/make d50e78868db97d16cce2e2cda900edd129674144
build/pesto d554620e6f7ad178b71ebb8c4269830cbd24ad8c
build/soong c80e6e3b82f2c0fded69b44b514d4c4d5519c9b5
cts 5f6e2dedd307f20dcf663ae17ab5db8664092430
@ -201,7 +201,7 @@ external/catch2 5f8628024c5a9219caa004d6a9547aacd9ba94c1
external/cblas 4fdeda64177f60e1b226349885b3c0ea016f3068
external/cbor-java 6b4b6adc5ff8f91e2ddef14adf510e14aaf90204
external/chromium-trace 9456b95a6d4b95c765c9f2264a71b0334f6cf8d7
external/chromium-webview b270aa98312408d5893ee72fcd62b4d89937ceb2
external/chromium-webview 8400ae9b819741cd4d436cce372496426ec85fc9
external/clang 9fae335badf26813486d207b69928d38b979e522
external/cldr 7518f37169bd87d6977244e4d7471bc48fcd62e0
external/cn-cbor 7b581886d1830f50c3ab104a56b7ab931779466f
@ -801,8 +801,8 @@ external/zopfli 15fdf31c61251f3e5aa3b188df2770eb153b9484
external/zstd e6a035a8df42f375160f2acabe3caa283a0184d7
external/zucchini 11a3a4cd409d6e0f4ccfcfb97cc962eeaeddde00
external/zxing 248d7c742809ce1cbde1c4e6163d347e1feb274b
frameworks/av 34e3e39fec7fc83579cde07f9f0f780f5983ea59
frameworks/base 9de25e848a553a4a7a48e6af57d83b5789305e29
frameworks/av 17fdb80d01ef17849c4d4e1100d05d29977117b2
frameworks/base 60d7470e933152d1d2f521442ebfab213a957737
frameworks/compile/libbcc 81c07084cca2a6feab53eeb022f5d5a3ab5c10c5
frameworks/compile/mclinker 18374a53dc8e00ec3667b4e1a257c9b4e41f007f
frameworks/compile/slang 1738348ca3d011f3f340883bd48e03a8e6aeb143
@ -853,7 +853,7 @@ hardware/google/pixel-sepolicy eec446aa4fb152d6651c90de682cf73f8e202bd4
hardware/interfaces 2f83e1bda9536aaf406352c868a8192cc3526a69
hardware/invensense 004a2dd5ea0d3a777520319536de119be1ba0049
hardware/knowles/athletico/sound_trigger_hal 61ca38058a06c524677654d67d6f4bed7757f1d7
hardware/lge 8c71fb6e2e7a3c3ea98addc8aeb9786c41086932
hardware/lge 8393294a9e798bfe60f13b6c87b749291fc1a997
hardware/libhardware 0eb202d7ebd7d2410eb2f62c908c0341964a4829
hardware/libhardware_legacy 50d9f52f7a7d4c70f10d6a9dca9a1f83a16c85ca
hardware/lineage/compat 015d90baa57a65c5bdeed20997dfdede50e65ca7
@ -861,8 +861,8 @@ hardware/lineage/interfaces 56bf43755bdc4045ec56b4c02eaaaf9894f91003
hardware/lineage/livedisplay 3e298771b18d6c0e28350f50c7204c3c036662b8
hardware/nxp/nfc ea29b939898b9b7aa998124d3bbc9e7322c01514
hardware/nxp/secure_element 69b223b099f01b59100a175cc6b1ce11c76d203a
hardware/oneplus 94d2a07242f77c24d14a3595b4661b31494c0a9f
hardware/oplus fe8e16ca54ee60c3180a7c04aec16bed9c31da18
hardware/oneplus f4b6451ae857e6dbb7d0aab19adeb302d201eb31
hardware/oplus 88598d59aac8b83420958f8296756377f39a0703
hardware/qcom-caf/bootctrl e4868c89bd6433a5d14df4b33f66b2003bddb7ad
hardware/qcom-caf/bt b7218e4c89817079546f035f3cfe5f99b4730d43
hardware/qcom-caf/common b7371b2235ec060d226a56729cf29db0e54423a2
@ -930,9 +930,9 @@ hardware/qcom/sm8150/thermal 72f214e79db46e82d3dd21a2ed7f6ba418a6505f
hardware/qcom/sm8150/vr 1b71f99dcada3b7e90d1eb8ef34e3788b021a2cc
hardware/qcom/wlan 5d9edb7febcccde673bcf58cd2606e87115c6e2f
hardware/ril ff9403ff624c153bfd1e4b68d5fc396c8bd64c8e
hardware/samsung a9d952501754e9cf145e5d51d3f534c0a06758af
hardware/samsung 106ac6c4aa83ef63ced58533e8c7d761a9ca0a63
hardware/samsung/nfc d4195a0bdfe35a6201cf1b5e222eb532a92cff2a
hardware/sony/SonyOpenTelephony 1af8f6cba347523605c80a2105fe53b3e3802344
hardware/sony/SonyOpenTelephony a31d23b2326261a8e0c2a004a36d7757e9a753ea
hardware/sony/macaddrsetup d2871b2041790f6d291e207bec8b0ef34029ef59
hardware/sony/simdetect b121cd8ddb0721c406fc9a6d052d13b9b0084669
hardware/sony/timekeep 11c1535c71b97f0ab833e215a8121ed107235010
@ -1029,11 +1029,11 @@ kernel/xiaomi/vayu 6c9febddfbd505b760d12f585288cf7612ad57d8
kernel/zuk/msm8996 cc57cb4ee3b7918b74d30604735d353b9a5fa23b
libcore 2a7d66adbcde1862f9295ae0a13f1751b193e4d7
libnativehelper 49ecc5f1e97e810d27e2c6558abdde49e875349b
lineage-sdk 98624a8c1ceba03d7ffa4f0c3ce90e827be528e1
lineage-sdk 3c88fb4dc96aaa8254cc39aabc518573bd845b76
lineage/scripts e00ff2fbab893d49522b12c10cd2672198bc8455
packages/apps/Aperture b6ba832b7bc94140d55f1a4577d06e0d36fcb3f6
packages/apps/Aperture 68ad06e8d323996c66add1bb0a4d7ec1ed00bb1a
packages/apps/AudioFX 15e2a666d21551698ea0744996abcdc35e6c0cc1
packages/apps/Backgrounds 3b5c676d5a2747e92b14a79707c0aa3a6339bd4f
packages/apps/Backgrounds 79f8b864a97ab942dfb4c869ed20ed00462a9974
packages/apps/BasicSmsReceiver ae8e590ae7856e3007fe2b78489894a5fbf3f36a
packages/apps/Camera2 e290e9ea0161e4ad162a9f17f376178e7fa36521
packages/apps/Car/Calendar 74a8375041155969dca0cf89725e30b28d905473
@ -1060,24 +1060,24 @@ packages/apps/CarrierConfig 6e3308a1bdcf61444ab2bb4ea886be705099da99
packages/apps/CarrierConfig2 e710a67ed64620fc11f62520cceef4bba64dc2a6
packages/apps/CellBroadcastReceiver 3d7340eeac82125cd9091fc368a031e98f4db7fd
packages/apps/CertInstaller 98a80cd7f6f9ad8b46acb5c4798fd2d9253d37c4
packages/apps/Contacts 643d0cb2481a46bfba3c2c0d778024750d7916ae
packages/apps/DeskClock 8e3a5a8312a06117fadd0c230711fe13a94ea381
packages/apps/Dialer 0704ba5110a58b6cba29fb85293d10f07a2313ed
packages/apps/DocumentsUI 0458482621fcdca3ee3938b3813f8d17421d62e0
packages/apps/ElmyraService 9b620ce5768f74688000df8b046a672f14024bf6
packages/apps/Contacts 511d7675a5e9b58a7af738e50e8e108ccc0d2b6f
packages/apps/DeskClock 5886f8ec668c86af99d7a7579bc8211f578cf302
packages/apps/Dialer 705488e797020e3ef84080682ee79a0e72a3d68a
packages/apps/DocumentsUI e8bc0248fe5672cc4242b0e4c4196a28233d77ec
packages/apps/ElmyraService f1f42c57441fad817d5da7e04ecb742d389119c5
packages/apps/EmergencyInfo e8fe444bd8f8d9b807ed9da969d4147896af6142
packages/apps/Etar b764cf54e48bfb8f85beb8a8e7843924ad26ed21
packages/apps/Etar fb5f3f9cf0dc373672d979ff3f98afab3ac39fd1
packages/apps/ExactCalculator 92dd1417a6af570904e0d8c422f5a961ec693754
packages/apps/FMRadio 1d304d4bb6c4b0d53758622cd7ce2d71795e1dbe
packages/apps/FlipFlap 2a3cdf5470eacac157707e10d99109fd34b03586
packages/apps/FlipFlap 238c75bdd274d0397214c8b865a6719e4151f844
packages/apps/Gallery2 bca6838e1944f5b80e04cc90a85213270cf3477c
packages/apps/HTMLViewer 40ee5730f96f840b1be7cbe8daabddd543eba49b
packages/apps/ImsServiceEntitlement 79a64a6e1d2602e81977a628ae385002bddd9e89
packages/apps/KeyChain d90f056762b0390f0c1a9823af51894f14a9f746
packages/apps/LineageCustomizer 6d78f750ddfe8b7b5821a9ce83860755491b8bd8
packages/apps/LineageParts 3eef1bb94af92f0e3af9592000bc94a81be5d66f
packages/apps/LineageParts 59a318dacd9270ccfee899479fa33502b36942bd
packages/apps/ManagedProvisioning 4986c737e21b57a0545a4ba4f63be02e26f09243
packages/apps/Messaging bab56b560faa0a53a452020ac571f6c6996a4ecf
packages/apps/Messaging f3d40fe9a4cb85d1a425301e69c6ffbd44dc2f31
packages/apps/Nfc c28555164b8d2c8e12d7d4439f1ce9d83b9655ab
packages/apps/OnDeviceAppPrediction 460e94bc49773d6e1a442fe0885e64bf3de98992
packages/apps/OneTimeInitializer 3f70a0dbc890d9f125c4090b4ccfd5157ad87a64
@ -1085,14 +1085,14 @@ packages/apps/PhoneCommon f44c97cc5c6de1c980694af76d1692157dd50a0c
packages/apps/Profiles 9494c0176f0c36a342d73f4e5e8c27a10c4f3919
packages/apps/Provision 841d5199e1d1c64e7853fd953eed5247780908c1
packages/apps/QuickAccessWallet ad935df93a556861473b3b411e255b4165d67fc0
packages/apps/Recorder cdbc090b915989900d40b2d89fd1e737e5631e43
packages/apps/Recorder 304e192ccb4f19725c62cf3c618cdac459e8f0b0
packages/apps/RemoteProvisioner 06d16c8031ce54bff1a07cc64f8b02140a3753c1
packages/apps/SafetyRegulatoryInfo f5dfd6ab7ea6aaa1a0014106110733e316379e95
packages/apps/SecureElement 7e9d165899058103fa612ffb41858e4fd975182b
packages/apps/Seedvault e03ad756817631611b7497d9fe7b2173e2756b9d
packages/apps/Settings 3231fe73fe6ff70aa691a4d66d16ec59407559e6
packages/apps/Settings 6abfb48c2f85122643a21986e77412f61500cc1c
packages/apps/SettingsIntelligence 4ef92f41721f25bbdec5c0b2433547ef323e72ac
packages/apps/SetupWizard 0880f18b4a513681961f0ad0dd22d756e2a58fa1
packages/apps/SetupWizard 64d9f5984dc03d39825b7d01dabff42f55dde79e
packages/apps/SimpleDeviceConfig 82d31b18dd2550e05f89248f128cb571eecc863a
packages/apps/SimpleSettingsConfig f5620aa22a44ac3a9794d0fda5c146efd7e0a11e
packages/apps/Stk 9cbb287404fb15a3a13c63f15b73962cdd18529d
@ -1101,22 +1101,22 @@ packages/apps/SystemUIGo 5431a35c7bc359a226440d24f89ce13801266af4
packages/apps/TV b1a0cfb28cb809da961f520058ba8f93d2649975
packages/apps/Tag 2e6b762fba6b10af7c003f801c1f6fd8f1962038
packages/apps/Test/connectivity 6179ceeccf2ed30919d9e913f8a43ee81d01d41c
packages/apps/ThemePicker a6f6713edd80bff058dda9ba9b093a9f61e29d42
packages/apps/ThemePicker f9a905d6fdd564a79d091f23f8b3f0cbf2b6f353
packages/apps/TimeZoneData 498c5148458a63598417d2b2369fbed3ab19331c
packages/apps/TimeZoneUpdater e862d8ef6370b8540a8dd010d9c8dcff20735af5
packages/apps/Traceur f1f531bd3dd414aa6b8d81d517b3c6c9164a657b
packages/apps/Trebuchet 4d6edfeef832f44d6b747aad4785baf8953ed5ee
packages/apps/Trebuchet f2c7544ad99f2b6ee9027e7d58469fbb8b6dc6c4
packages/apps/TvSettings 82d09fbb7635d4eaf4496925768697f272614abc
packages/apps/UniversalMediaPlayer a56170cac624f5cd5b5344de8a24b074049d9076
packages/apps/Updater 02236a21de7ef116fe83e0e8dea942cf6729ee92
packages/apps/Updater c927dd9e78031f2cf4e08ff726956d68b38cac7a
packages/apps/WallpaperPicker 5b6254f657aa278f874b819f8de2edeb59acf85c
packages/apps/WallpaperPicker2 87e1441dc8743a3518d92f941e6f784c9eedc5c1
packages/inputmethods/LatinIME 9f52c6ea6d1f1820dd5aa707058a87ab51c0e653
packages/inputmethods/LatinIME eb7b5ae969456be4685b6024707e8360df4e5ee9
packages/inputmethods/LeanbackIME 945d4dc0f957bd3538a286b41babd93002d93d5c
packages/modules/AdServices cf7fdc79568f5adb4028e9339bea92429d109cb7
packages/modules/AppSearch 5afd5a663c198a6b83ce8b4c49ae40903afae022
packages/modules/ArtPrebuilt 2363a7573c76c3731c66f36a858ab7811e373b1a
packages/modules/Bluetooth fe486ae592d0408c9bb220af1b9818b2f891403d
packages/modules/Bluetooth e9534a1a3e0a5e17fc449ffc54d911c4a8535d56
packages/modules/BootPrebuilt/5.10/arm64 95cfa206c00dd5fcc72991f80ddfe383e76095ad
packages/modules/BootPrebuilt/5.4/arm64 3130a05a2f71e6c43892db92148956af0b05a406
packages/modules/CaptivePortalLogin 1c4915e0f233b0f2ed7883bbb193df3980a72fc5
@ -1134,7 +1134,7 @@ packages/modules/NetworkPermissionConfig 99a7b05e8e8863c9b6026dc36aa0a97c48ee9df
packages/modules/NetworkStack f6272676a666dd6277b171105f10bd62f9ec9da7
packages/modules/NeuralNetworks 99d8a8b1e6d508cae01fa74b54b938ad6c4c9097
packages/modules/OnDevicePersonalization c77d3e115dc78b1166d399ded73c7c139a60a5eb
packages/modules/Permission 74122236cc8111844acd4666467a5a4553e9282c
packages/modules/Permission c26508eecfc1bf8f1a7ec00eb8cfd4ef443d597d
packages/modules/RuntimeI18n a529a236d02913ef712cd497a06d575c128e5079
packages/modules/SEPolicy ff064aedc19c5d989724fde8669b8ac998ad80bc
packages/modules/Scheduling 6226c065a1a488a08a9cca91dfe481d829608585
@ -1153,13 +1153,13 @@ packages/providers/BookmarkProvider 6decb4dda8bdd12bdd468d8d3adf8f1cbf405a5d
packages/providers/CalendarProvider d3e7b7e388e965f93eebcbd0eb55a01bb066825f
packages/providers/CallLogProvider 6b1f75f22f42379ae507ca1f958e8c83b5448a36
packages/providers/ContactsProvider 41edc60825cbe5f95e1f7d5646481a19b0fafbd9
packages/providers/DownloadProvider 55f4a43af5abbf7b4c69535954cb6bf523a3be1b
packages/providers/DownloadProvider ecf6e5833a3214ee1dceabeb15911cfb199d1c1f
packages/providers/MediaProvider 65a76a9ffe9f25f466bc37f5f888d98c46ee660b
packages/providers/PartnerBookmarksProvider d982e500f09447d000f2ca67782831cc6b599330
packages/providers/TelephonyProvider 64aa1787b56d1e9b03bcd18dc652aa7a395c4db0
packages/providers/TvProvider c0e54c118bc93bce2f3edaa5fa9c59089c896dc8
packages/providers/UserDictionaryProvider 1a5d6d4997847e0ec2040be5cb9a7efaf1620e72
packages/resources/devicesettings 56aa5f8ce46b2fcbc418216f2b96ed6f44693d55
packages/resources/devicesettings 6af1f0af1b3e2b8a5b8aec1886289c909533ef75
packages/screensavers/Basic d3aaa026dc3eaf7a249c1a00c1a0524e9c1bb349
packages/screensavers/PhotoTable d5a731373f32b698776402bae8ff09a9676b6bb1
packages/services/AlternativeNetworkAccess dc09bf9c4b5652ef0096e4991f565854160395af
@ -1168,7 +1168,7 @@ packages/services/Car cdffba0abe1ccb414799a46971eb699b658e1996
packages/services/Iwlan 399b21135748ac6da9a8a10c72bec73a8339ccaf
packages/services/Mms c1db4f516a3d6ab623f698c9e51cd542a6fa669e
packages/services/Mtp 5d827f2e69dacf1cfddc03e66466f9af9a908b9f
packages/services/Telecomm 534ee8af3feff8972eb1a81ebde366fec75502fa
packages/services/Telecomm c9ddef28175c3054703d3f492da3c259a145aafb
packages/services/Telephony 544ea2dd2707dd10ab6f15b5e0f98a579a7d32ab
packages/wallpapers/ImageWallpaper 0a1680f07b09889c7642a775b6bb69d1b27f9b09
packages/wallpapers/LivePicker 66c64bcedc62dadc173a0a27e93b7a519e6e6921
@ -1280,7 +1280,7 @@ system/nfc 99dcb4312dbe28fb7f102344c707dab82e8bf9cb
system/nvram 02029bfe8da6fe8131ac170f113aa60ea420e398
system/qcom ddd4779b4684d61dd63a6e71f3be00820ea831fd
system/security 152f7b0b83647e9c3b74c47fd6bfc423fd2ffe7f
system/sepolicy 65ac550f66480aed7cdfc50960c85dd04c00d4fc
system/sepolicy 60f5720f939213f8e20ec4eaab49d5348576c70d
system/server_configurable_flags 339e12300f282c70fae5cc88d1f06f2a0343f772
system/teeui 965115e7b4ee5ea5434761a353cc24d953ede3fc
system/testing/gtest_extras bf9eec9ab621911ed528e9fd83f7b3f11fa68bb1
@ -1337,7 +1337,7 @@ tools/tradefederation/prebuilts dcb8956ae70359e7f554b9eb50e185d2a7feb6cd
tools/treble d74b74010472ba957f4125b676a41c23ca91e549
tools/trebuchet 9ff3c1fd3ea48b7c148fc1f6e2456dbc5596ca8d
vendor/codeaurora/telephony ebdb27e3a6d9f94aed27dee2819829a3d656ad20
vendor/crowdin adb204aa0d563fc5daa8e1837f70cb446ceda10d
vendor/crowdin 56dab3de644f0101615a0f6770d2bc65e19adf7d
vendor/essential/mata 3e37777606e559f33c9e1d247b15de1fac359fe5
vendor/fairphone/FP3 6ebc77ace3dce27e03973ddb4bb9629de576cdd7
vendor/fairphone/FP4 6482b251c7c1620cbc85d513cfd12fce70ff6eb6

@ -1 +1 @@
Subproject commit 0f7469f7422aeef9d5aa04a6b6590edf19688a0e
Subproject commit b6d2aca454773109e6e1a1c04716f2f09682e4b9

View File

@ -952,6 +952,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch
@ -964,7 +965,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p964"
editKernelLocalversion "-dos.p965"
else echo "kernel_amazon_hdx-common is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -616,6 +616,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -624,7 +625,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p624"
editKernelLocalversion "-dos.p625"
else echo "kernel_asus_grouper is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -653,6 +653,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
@ -662,7 +663,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p662"
editKernelLocalversion "-dos.p663"
else echo "kernel_htc_msm8960 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -788,6 +788,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
@ -800,7 +801,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p800"
editKernelLocalversion "-dos.p801"
else echo "kernel_htc_msm8994 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -873,6 +873,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -884,7 +885,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p884"
editKernelLocalversion "-dos.p885"
else echo "kernel_lge_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -740,6 +740,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -749,7 +750,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p749"
editKernelLocalversion "-dos.p750"
else echo "kernel_motorola_msm8952 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -728,6 +728,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
@ -737,7 +738,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p737"
editKernelLocalversion "-dos.p738"
else echo "kernel_samsung_d2 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -413,11 +413,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p417"
editKernelLocalversion "-dos.p418"
else echo "kernel_samsung_exynos5420 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -531,6 +531,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -538,7 +539,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p538"
editKernelLocalversion "-dos.p539"
else echo "kernel_samsung_manta is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -545,6 +545,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -553,7 +554,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p553"
editKernelLocalversion "-dos.p554"
else echo "kernel_samsung_smdk4412 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -535,6 +535,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -543,7 +544,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p543"
editKernelLocalversion "-dos.p544"
else echo "kernel_samsung_tuna is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1081,6 +1081,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -1092,7 +1093,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1092"
editKernelLocalversion "-dos.p1093"
else echo "kernel_samsung_universal8890 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -876,6 +876,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch
@ -894,7 +895,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p894"
editKernelLocalversion "-dos.p895"
else echo "kernel_asus_fugu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -689,6 +689,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -699,7 +700,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p699"
editKernelLocalversion "-dos.p700"
else echo "kernel_asus_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1050,6 +1050,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
@ -1063,7 +1064,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1063"
editKernelLocalversion "-dos.p1064"
else echo "kernel_google_dragon is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -682,6 +682,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -693,7 +694,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p693"
editKernelLocalversion "-dos.p694"
else echo "kernel_htc_flounder is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -807,6 +807,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
@ -819,7 +820,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p819"
editKernelLocalversion "-dos.p820"
else echo "kernel_huawei_angler is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -818,6 +818,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch
@ -830,7 +831,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p830"
editKernelLocalversion "-dos.p831"
else echo "kernel_lge_bullhead is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1042,6 +1042,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -1052,7 +1053,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p1052"
editKernelLocalversion "-dos.p1053"
else echo "kernel_zte_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -687,6 +687,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -697,7 +698,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p697"
editKernelLocalversion "-dos.p698"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -582,6 +582,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -589,7 +590,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p589"
editKernelLocalversion "-dos.p590"
else echo "kernel_cyanogen_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -732,6 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -742,7 +743,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p742"
editKernelLocalversion "-dos.p743"
else echo "kernel_google_yellowstone is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -538,6 +538,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
@ -550,7 +551,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p550"
editKernelLocalversion "-dos.p551"
else echo "kernel_samsung_apq8084 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -687,6 +687,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -697,7 +698,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p697"
editKernelLocalversion "-dos.p698"
else echo "kernel_cyanogen_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -731,6 +731,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
@ -740,7 +741,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p740"
editKernelLocalversion "-dos.p741"
else echo "kernel_motorola_msm8916 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -655,6 +655,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -664,7 +665,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p664"
editKernelLocalversion "-dos.p665"
else echo "kernel_motorola_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -657,6 +657,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -666,7 +667,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p666"
editKernelLocalversion "-dos.p667"
else echo "kernel_oneplus_msm8994 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1052,6 +1052,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -1066,6 +1067,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43882/4.19/0002.patch
@ -1083,6 +1085,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch
@ -1090,7 +1098,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1090"
editKernelLocalversion "-dos.p1098"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -899,6 +899,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch
@ -907,7 +908,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p907"
editKernelLocalversion "-dos.p908"
else echo "kernel_yandex_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -396,10 +396,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p399"
editKernelLocalversion "-dos.p400"
else echo "kernel_fairphone_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -856,6 +856,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch
@ -868,7 +869,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p868"
editKernelLocalversion "-dos.p869"
else echo "kernel_google_marlin is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -573,6 +573,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch
@ -583,7 +584,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p583"
editKernelLocalversion "-dos.p584"
else echo "kernel_google_msm is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -683,6 +683,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -693,7 +694,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p693"
editKernelLocalversion "-dos.p694"
else echo "kernel_htc_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -610,6 +610,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -617,7 +618,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p617"
editKernelLocalversion "-dos.p618"
else echo "kernel_lge_g3 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -547,6 +547,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -555,7 +556,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p555"
editKernelLocalversion "-dos.p556"
else echo "kernel_lge_hammerhead is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -190,10 +190,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p193"
editKernelLocalversion "-dos.p194"
else echo "kernel_lge_mako is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -595,13 +595,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p601"
editKernelLocalversion "-dos.p602"
else echo "kernel_lge_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -574,6 +574,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch
@ -587,7 +588,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p587"
editKernelLocalversion "-dos.p588"
else echo "kernel_moto_shamu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -664,6 +664,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
@ -672,7 +673,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p672"
editKernelLocalversion "-dos.p673"
else echo "kernel_motorola_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -878,6 +878,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
@ -887,7 +888,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p887"
editKernelLocalversion "-dos.p888"
else echo "kernel_motorola_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -707,6 +707,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch
@ -716,7 +717,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p716"
editKernelLocalversion "-dos.p717"
else echo "kernel_nextbit_msm8992 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -866,6 +866,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch
@ -875,7 +876,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p875"
editKernelLocalversion "-dos.p876"
else echo "kernel_oneplus_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -538,11 +538,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p542"
editKernelLocalversion "-dos.p543"
else echo "kernel_oppo_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -611,6 +611,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch
git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch
@ -621,7 +622,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p621"
editKernelLocalversion "-dos.p622"
else echo "kernel_samsung_jf is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -693,6 +693,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch
@ -705,7 +706,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p705"
editKernelLocalversion "-dos.p706"
else echo "kernel_samsung_msm8930-common is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -424,10 +424,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p427"
editKernelLocalversion "-dos.p428"
else echo "kernel_samsung_msm8974 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -546,11 +546,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p550"
editKernelLocalversion "-dos.p552"
else echo "kernel_xiaomi_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1132,6 +1132,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -1146,6 +1147,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
@ -1164,6 +1166,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1174,7 +1182,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1174"
editKernelLocalversion "-dos.p1182"
else echo "kernel_xiaomi_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -571,6 +571,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -578,7 +580,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p578"
editKernelLocalversion "-dos.p580"
else echo "kernel_essential_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -428,6 +428,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -456,6 +457,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -465,7 +470,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p465"
editKernelLocalversion "-dos.p470"
else echo "kernel_fairphone_sdm632 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -428,6 +428,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
@ -448,8 +449,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43835/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
@ -477,13 +480,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45025/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p483"
editKernelLocalversion "-dos.p495"
else echo "kernel_fairphone_sm7225 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -524,11 +524,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p528"
editKernelLocalversion "-dos.p530"
else echo "kernel_fxtec_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -428,6 +428,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
@ -448,8 +449,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43835/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
@ -477,13 +480,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45025/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p483"
editKernelLocalversion "-dos.p495"
else echo "kernel_fxtec_sm6115 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -86,6 +86,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48655/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48674/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48708/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48733/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48739/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48772/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
@ -740,6 +741,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/5.10/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38564/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38577/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/5.10/0004.patch
@ -894,6 +896,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42242/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42244/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42253/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/5.10/0004.patch
@ -925,11 +928,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43815/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43828/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43829/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43835/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43841/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43846/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43849/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.10/0003.patch
@ -942,6 +947,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43889/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43905/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43907/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43908/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/5.10/0003.patch
@ -955,6 +961,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44965/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44969/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44971/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44974/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44982/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44989/5.10/0002.patch
@ -964,8 +971,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45003/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45016/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45018/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45019/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45025/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45026/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45028/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46676/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46679/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46684/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46702/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46713/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26750/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
@ -973,7 +1000,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p973"
editKernelLocalversion "-dos.p1000"
else echo "kernel_google_gs101_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -86,6 +86,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48655/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48674/^6.0/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48708/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48733/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48739/^5.16/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48772/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48781/^5.17/0001.patch
@ -738,6 +739,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/5.10/0004.patch
#git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38564/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38577/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/5.10/0004.patch
@ -892,6 +894,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42242/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42244/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42253/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/5.10/0004.patch
@ -923,11 +926,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43815/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43828/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43829/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43835/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43841/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43846/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43849/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.10/0003.patch
@ -940,6 +945,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43884/5.10/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43889/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43890/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43893/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43905/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43907/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43908/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43914/5.10/0003.patch
@ -953,6 +959,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44965/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44969/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44971/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44974/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44982/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44989/5.10/0002.patch
@ -962,8 +969,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45003/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45016/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45018/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45019/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45025/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45026/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45028/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46676/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46679/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46684/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46702/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46713/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.10/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26750/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch
@ -971,7 +998,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.10/0003.patch
editKernelLocalversion "-dos.p971"
editKernelLocalversion "-dos.p998"
else echo "kernel_google_gs201_private_gs-google is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -427,6 +427,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -443,6 +444,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
@ -463,12 +465,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p468"
editKernelLocalversion "-dos.p477"
else echo "kernel_google_msm-4.14 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -431,6 +431,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -459,6 +460,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -468,7 +473,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p468"
editKernelLocalversion "-dos.p473"
else echo "kernel_google_msm-4.9 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -640,6 +640,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
@ -660,8 +661,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42310/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43835/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
@ -688,13 +691,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45025/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p694"
editKernelLocalversion "-dos.p706"
else echo "kernel_google_redbull is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -540,6 +540,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch
@ -547,7 +549,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p547"
editKernelLocalversion "-dos.p549"
else echo "kernel_google_wahoo is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -524,11 +524,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p528"
editKernelLocalversion "-dos.p530"
else echo "kernel_lge_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -528,11 +528,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p532"
editKernelLocalversion "-dos.p534"
else echo "kernel_oneplus_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -436,6 +436,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
@ -466,6 +467,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -475,7 +480,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p475"
editKernelLocalversion "-dos.p480"
else echo "kernel_oneplus_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -480,6 +480,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
@ -500,8 +501,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43835/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
@ -529,13 +532,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45025/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p535"
editKernelLocalversion "-dos.p547"
else echo "kernel_oneplus_sm7250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1097,6 +1097,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42157/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -1111,6 +1112,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
@ -1129,6 +1131,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch
@ -1138,7 +1146,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1138"
editKernelLocalversion "-dos.p1146"
else echo "kernel_oneplus_sm8150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -426,6 +426,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
@ -446,8 +447,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43835/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
@ -475,13 +478,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45025/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p481"
editKernelLocalversion "-dos.p493"
else echo "kernel_oneplus_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -511,6 +511,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/5.4/0005.patch
@ -538,10 +539,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43829/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43835/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43841/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43846/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/5.4/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/5.4/0005.patch
@ -575,9 +578,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45003/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45016/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45025/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45026/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45028/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46679/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/5.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48783/^5.17/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48850/5.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.4/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26750/^6.8/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.4/0006.patch
@ -585,7 +602,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/5.4/0005.patch
editKernelLocalversion "-dos.p585"
editKernelLocalversion "-dos.p602"
else echo "kernel_oneplus_sm8350 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -524,11 +524,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p528"
editKernelLocalversion "-dos.p530"
else echo "kernel_razer_msm8998 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -432,6 +432,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
@ -462,6 +463,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -471,7 +476,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p471"
editKernelLocalversion "-dos.p476"
else echo "kernel_razer_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -1047,6 +1047,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -1070,6 +1071,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44947/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch
@ -1078,7 +1082,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p1078"
editKernelLocalversion "-dos.p1082"
else echo "kernel_samsung_exynos9810 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -539,11 +539,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p543"
editKernelLocalversion "-dos.p545"
else echo "kernel_sony_sdm660 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -915,6 +915,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -940,6 +941,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes-2024/4.9/0004.patch
@ -955,7 +959,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p955"
editKernelLocalversion "-dos.p959"
else echo "kernel_sony_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -427,6 +427,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42280/4.19/0002.patch
@ -455,6 +456,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -464,7 +469,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p464"
editKernelLocalversion "-dos.p469"
else echo "kernel_xiaomi_msm8937 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -440,6 +440,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42148/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42154/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
@ -469,6 +470,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch
git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch
@ -478,7 +483,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p478"
editKernelLocalversion "-dos.p483"
else echo "kernel_xiaomi_sdm845 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -465,6 +465,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
@ -482,6 +483,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
@ -502,12 +504,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p507"
editKernelLocalversion "-dos.p516"
else echo "kernel_xiaomi_sm6150 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -310,6 +310,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42228/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42259/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
@ -330,8 +331,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42311/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43830/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43835/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43856/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
@ -359,10 +362,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45006/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45008/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45025/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46689/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26720/4.19/0003.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.19/0002.patch
editKernelLocalversion "-dos.p362"
editKernelLocalversion "-dos.p374"
else echo "kernel_xiaomi_sm8250 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -467,6 +467,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42223/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42224/4.14/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42232/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42236/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42246/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42247/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42265/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42271/4.19/0002.patch
@ -484,6 +485,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42313/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42315/^6.10/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43839/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43853/4.19/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43854/4.19/0005.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43858/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43861/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-43879/4.19/0002.patch
@ -504,12 +506,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44960/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44987/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44999/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45021/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-45030/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46674/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46677/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46685/4.19/0002.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.14/0009.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-42104/4.14/0009.patch
editKernelLocalversion "-dos.p509"
editKernelLocalversion "-dos.p518"
else echo "kernel_xiaomi_vayu is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"

View File

@ -539,12 +539,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44939/^6.9/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44944/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44948/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-44998/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46673/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-46681/^6.11/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0
git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch
git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch
editKernelLocalversion "-dos.p544"
editKernelLocalversion "-dos.p546"
else echo "kernel_zuk_msm8996 is unavailable, not patching.";
fi;
cd "$DOS_BUILD_BASE"