diff --git a/Logs/resetWorkspace-LineageOS-18.1.txt b/Logs/resetWorkspace-LineageOS-18.1.txt index 5d6ac93e..1459a7cc 100644 --- a/Logs/resetWorkspace-LineageOS-18.1.txt +++ b/Logs/resetWorkspace-LineageOS-18.1.txt @@ -135,7 +135,7 @@ external/cblas d82c5f4ae14b2a5468303985070f7dadc15d4094 external/cbor-java f81e576298790c97498311e99a0b0b34653c3dd8 external/chromium-libpac 169c93e00a00605346a68d39d3f4713735bdb61e external/chromium-trace e524766cad26d677a9a1ec8c00c512d4cac2cf5e -external/chromium-webview b796168b7ca30f621e1c85271044bd56d74bde23 +external/chromium-webview ef62acbe255f65218a2122885a27624a0178ba14 external/clang 0a1c53a5d295109bd4702ad13c0f2a5510ca1b26 external/cldr 38850463abd624d5b2293be75fddc43cf6b55ae2 external/cn-cbor 696530332036f5518681d3c450cdbc3ee412004a @@ -858,7 +858,7 @@ tools/loganalysis 915dbf1d7ed0f684d2d1bc3a6be9ef417c93527d tools/metalava 21659a2683eed66e16aeafeb8d9c40916946a51b tools/ndkports d0ec81e4b134f4b1446d3fd5a6dfbf095475597c tools/platform-compat b553fea7dd2aa8dcc26f4d8f91effd86e55dd72e -tools/repohooks eee438b68bc9c55036016d681269ee8c261c94ff +tools/repohooks c2c8692c55a22d15d57ae05a226c731aca7cf3ba tools/security a5c3644bd83674858e0b9d5da3e6014a3cbf3ba6 tools/test/connectivity 38ccb70b61038b0be21da87ae626b01a3d162bf8 tools/test/graphicsbenchmark 7c31a9c1f32d602e1b50446951088d3beddedb84 diff --git a/Logs/resetWorkspace-LineageOS-19.1.txt b/Logs/resetWorkspace-LineageOS-19.1.txt index 18036aa2..82a78d1e 100644 --- a/Logs/resetWorkspace-LineageOS-19.1.txt +++ b/Logs/resetWorkspace-LineageOS-19.1.txt @@ -94,7 +94,7 @@ external/catch2 2b2e0e9540defee10f28ea0fc97750490fa238b5 external/cblas 2b24922070cb6d45edd5f5b533db0637099a2b17 external/cbor-java 00c4a382dd3810f9c1b363eaad339cff34a3f6fe external/chromium-trace 138ade68f9d3388a1b0a6d9ce5e091ff6f7e7448 -external/chromium-webview b796168b7ca30f621e1c85271044bd56d74bde23 +external/chromium-webview ef62acbe255f65218a2122885a27624a0178ba14 external/clang f1cef8e77ae220c9379303bdc9896e0c2366bd6f external/cldr 242ecd0dcb21f3376f825119ec0b36fcb15e7bb8 external/cn-cbor 6a0f6a5375b8cd9b495e91c11d21ed257ec9a905 @@ -798,7 +798,7 @@ kernel/xiaomi/sm8150 950783ac4623027778367cb8f8c6c24f17e88dd9 libcore 3d79b82fa5058fadc5c9696811b38a48cb5eddbb libnativehelper 4127df85264539c1fcc6dcbf59410e9edaa2e0c6 lineage-sdk d4565e22e04e8030ac8d8551dfe11a868b8366a9 -lineage/scripts 622b06dce028819f86949fb2b36a8e1ce3aed6cd +lineage/scripts 1767a10e4e3b0a7dceb0f1c2b4d78825792d53f6 packages/apps/AudioFX 2c1be3c3b062e397bfd1e780ddb0bae1f99c1b84 packages/apps/Backgrounds f778988c6b8d36e87399b5678239d4f696e4cab2 packages/apps/BasicSmsReceiver 7c6a070c68413bab5343043af3df220226759568 @@ -1082,7 +1082,7 @@ tools/extract-utils c12d3941893a6d1187986d85be04308104d13269 tools/metalava 0d8be7040dceaf9b084e909b6907e463ab7d3237 tools/ndkports a181fe59a34803a1ba7300bd1a32532b6dc3e9fb tools/platform-compat cfa5a189e9671992ba7ad5b8de5d59826544a592 -tools/repohooks eee438b68bc9c55036016d681269ee8c261c94ff +tools/repohooks c2c8692c55a22d15d57ae05a226c731aca7cf3ba tools/security 4af6777ed4b7a9c09508a600349e0e548174361f tools/test/connectivity a74e9d3afee07e92cc9f74345f91ea7cbe29d44d tools/test/graphicsbenchmark 6404f16911f96d9253847c1390fd81f1923954cd diff --git a/Logs/resetWorkspace-LineageOS-20.0.txt b/Logs/resetWorkspace-LineageOS-20.0.txt index 5fd9258a..f838c6ac 100644 --- a/Logs/resetWorkspace-LineageOS-20.0.txt +++ b/Logs/resetWorkspace-LineageOS-20.0.txt @@ -201,7 +201,7 @@ external/catch2 5f8628024c5a9219caa004d6a9547aacd9ba94c1 external/cblas 4fdeda64177f60e1b226349885b3c0ea016f3068 external/cbor-java 6b4b6adc5ff8f91e2ddef14adf510e14aaf90204 external/chromium-trace 9456b95a6d4b95c765c9f2264a71b0334f6cf8d7 -external/chromium-webview b796168b7ca30f621e1c85271044bd56d74bde23 +external/chromium-webview ef62acbe255f65218a2122885a27624a0178ba14 external/clang 9fae335badf26813486d207b69928d38b979e522 external/cldr 7518f37169bd87d6977244e4d7471bc48fcd62e0 external/cn-cbor 7b581886d1830f50c3ab104a56b7ab931779466f @@ -1030,7 +1030,7 @@ kernel/zuk/msm8996 cc57cb4ee3b7918b74d30604735d353b9a5fa23b libcore 2a7d66adbcde1862f9295ae0a13f1751b193e4d7 libnativehelper 49ecc5f1e97e810d27e2c6558abdde49e875349b lineage-sdk b0a28220c5d6d0d13d5a60da4a80538079721e30 -lineage/scripts 622b06dce028819f86949fb2b36a8e1ce3aed6cd +lineage/scripts 1767a10e4e3b0a7dceb0f1c2b4d78825792d53f6 packages/apps/Aperture 5d68af56eb88d663c54f083b117ad9911daaf193 packages/apps/AudioFX 15e2a666d21551698ea0744996abcdc35e6c0cc1 packages/apps/Backgrounds 3b5c676d5a2747e92b14a79707c0aa3a6339bd4f diff --git a/Patches/Linux b/Patches/Linux index bc2e6dd9..c5ba93c7 160000 --- a/Patches/Linux +++ b/Patches/Linux @@ -1 +1 @@ -Subproject commit bc2e6dd93df6ce9ad928f8d75bd2584c940461ac +Subproject commit c5ba93c77867e6fd6b26fc405df0f77c1b08bbf8 diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh index 54af8692..a065b268 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh @@ -788,6 +788,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0049.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch @@ -884,7 +885,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -898,9 +899,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4592/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.4/0008.patch @@ -913,7 +923,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p913" +editKernelLocalversion "-dos.p923" else echo "kernel_amazon_hdx-common is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh index f16ed6f2..e4977d35 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh @@ -457,6 +457,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch @@ -547,7 +548,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -561,9 +562,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -572,7 +582,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p572" +editKernelLocalversion "-dos.p582" else echo "kernel_asus_grouper is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh index 5f0ba9a0..58e1f588 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh @@ -471,6 +471,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch @@ -584,7 +585,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -598,9 +599,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch @@ -610,7 +620,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p610" +editKernelLocalversion "-dos.p620" else echo "kernel_htc_msm8960 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh index 5ffed8b8..63eb447f 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh @@ -570,6 +570,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch @@ -695,7 +696,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -712,10 +713,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch @@ -728,7 +743,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p728" +editKernelLocalversion "-dos.p743" else echo "kernel_htc_msm8994 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh index c6687b88..8ad60fbf 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh @@ -656,6 +656,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch @@ -781,7 +782,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -798,10 +799,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch @@ -813,7 +828,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p813" +editKernelLocalversion "-dos.p828" else echo "kernel_lge_msm8992 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8952.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8952.sh index e35087dd..6b246c30 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8952.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_motorola_msm8952.sh @@ -502,6 +502,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0007.patch @@ -646,7 +647,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -663,11 +664,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -677,7 +692,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p677" +editKernelLocalversion "-dos.p692" else echo "kernel_motorola_msm8952 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh index 209c21fb..967bd3d1 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh @@ -541,6 +541,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch @@ -659,7 +660,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -673,9 +674,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch @@ -685,7 +695,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p685" +editKernelLocalversion "-dos.p695" else echo "kernel_samsung_d2 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh index 06f943f7..149677de 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh @@ -251,6 +251,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0061.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0062.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0071.patch @@ -342,7 +343,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -356,14 +357,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p363" +editKernelLocalversion "-dos.p373" else echo "kernel_samsung_exynos5420 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh index d4da0158..a3cd5843 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh @@ -371,6 +371,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch @@ -462,7 +463,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -476,9 +477,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -486,7 +496,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p486" +editKernelLocalversion "-dos.p496" else echo "kernel_samsung_manta is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh index 232caf0e..37849b42 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh @@ -489,7 +489,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -501,7 +501,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -510,7 +518,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p510" +editKernelLocalversion "-dos.p518" else echo "kernel_samsung_smdk4412 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh index d4eb158c..4cde1846 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh @@ -482,7 +482,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -494,7 +494,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27429/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27430/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -503,7 +510,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p503" +editKernelLocalversion "-dos.p510" else echo "kernel_samsung_tuna is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh index 90f5aa7a..165369b0 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh @@ -781,6 +781,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch @@ -955,7 +957,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -976,13 +978,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0004-net-add-recursion-limit-to-GRO.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch @@ -994,7 +1011,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p994" +editKernelLocalversion "-dos.p1011" else echo "kernel_samsung_universal8890 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh index 8edab6c1..6dc24183 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh @@ -664,6 +664,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch @@ -786,7 +787,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -803,10 +804,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-3076/3.4/0003.patch @@ -825,7 +839,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p825" +editKernelLocalversion "-dos.p839" else echo "kernel_asus_fugu is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh index f43e0108..512cfe4a 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh @@ -450,6 +450,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0008.patch @@ -594,7 +595,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -611,11 +612,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -626,7 +641,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p626" +editKernelLocalversion "-dos.p641" else echo "kernel_asus_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh index 7670e297..c25a9f6d 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh @@ -740,6 +740,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch @@ -918,7 +920,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -939,14 +941,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/^6.8/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.18/0003-alt.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch @@ -960,7 +977,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p960" +editKernelLocalversion "-dos.p977" else echo "kernel_google_dragon is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh index d2352a4a..f386fe5b 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh @@ -461,6 +461,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch @@ -588,7 +589,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -605,11 +606,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch @@ -621,7 +636,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p621" +editKernelLocalversion "-dos.p636" else echo "kernel_htc_flounder is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh index 88a2a779..bf7aa4ca 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh @@ -585,6 +585,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch @@ -715,7 +716,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -732,10 +733,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch @@ -748,7 +763,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p748" +editKernelLocalversion "-dos.p763" else echo "kernel_huawei_angler is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh index f0e961b3..03dcf844 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh @@ -593,6 +593,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch @@ -726,7 +727,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -743,10 +744,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch @@ -759,7 +774,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p759" +editKernelLocalversion "-dos.p774" else echo "kernel_lge_bullhead is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh index e3d3f5c5..2f34244b 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh @@ -724,6 +724,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch @@ -912,7 +915,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -933,13 +936,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch @@ -950,7 +967,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p950" +editKernelLocalversion "-dos.p967" else echo "kernel_zte_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh index a64c827d..3c5a0995 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh @@ -447,6 +447,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0008.patch @@ -592,7 +593,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -609,11 +610,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -624,7 +639,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p624" +editKernelLocalversion "-dos.p639" else echo "kernel_cyanogen_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh index 45e226a4..aea702b4 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh @@ -388,6 +388,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0049.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch @@ -514,7 +515,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -528,9 +529,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -538,7 +548,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p538" +editKernelLocalversion "-dos.p548" else echo "kernel_cyanogen_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh index d0dea185..cf738fa4 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh @@ -511,6 +511,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch @@ -640,7 +641,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -657,10 +658,24 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -671,7 +686,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p671" +editKernelLocalversion "-dos.p686" else echo "kernel_google_yellowstone is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh index 40a397ce..7b74b5d3 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh @@ -315,6 +315,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0065.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch @@ -443,7 +444,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -460,11 +461,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch @@ -477,7 +492,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p477" +editKernelLocalversion "-dos.p492" else echo "kernel_samsung_apq8084 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh index a64c827d..3c5a0995 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh @@ -447,6 +447,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0008.patch @@ -592,7 +593,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -609,11 +610,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -624,7 +639,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p624" +editKernelLocalversion "-dos.p639" else echo "kernel_cyanogen_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh index 443ea72e..15d0feb1 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh @@ -499,6 +499,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0011.patch @@ -640,7 +641,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26999/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -657,10 +658,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch @@ -670,7 +684,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p670" +editKernelLocalversion "-dos.p684" else echo "kernel_motorola_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh index a5444304..cd39e0e5 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh @@ -429,6 +429,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch @@ -560,7 +561,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -577,11 +578,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -591,7 +606,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p591" +editKernelLocalversion "-dos.p606" else echo "kernel_motorola_msm8992 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh index a538b943..5f1e7add 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh @@ -431,6 +431,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch @@ -562,7 +563,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -579,11 +580,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -593,7 +608,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p593" +editKernelLocalversion "-dos.p608" else echo "kernel_oneplus_msm8994 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh index 372584e3..814a2281 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_xiaomi_sm6150.sh @@ -432,6 +432,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47571/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47576/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47583/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47600/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47603/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47606/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47609/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0004.patch @@ -615,12 +625,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4244/4.19/0025.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.19/0004.patch @@ -845,6 +855,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -855,13 +866,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p861" +editKernelLocalversion "-dos.p888" else echo "kernel_xiaomi_sm6150 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh index 90148d3c..3f6b4eda 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh @@ -444,6 +444,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47571/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47600/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47606/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch @@ -717,7 +722,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -740,19 +745,34 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch @@ -761,7 +781,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p761" +editKernelLocalversion "-dos.p781" else echo "kernel_yandex_sdm660 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh index 8685abb7..7d93178c 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh @@ -244,6 +244,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0071.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0072.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch @@ -328,7 +329,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -342,13 +343,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p348" +editKernelLocalversion "-dos.p358" else echo "kernel_fairphone_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh index ff890ae7..9871d88f 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh @@ -537,6 +537,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch @@ -729,7 +732,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -750,14 +753,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0002-ozwpan-Use-unsigned-ints-to-prevent-heap-overflow.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-01/ANY/0005-tcp-fix-zero-cwnd-in-tcp_cwnd_reduction.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5853/3.18/0002.patch @@ -770,7 +787,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p770" +editKernelLocalversion "-dos.p787" else echo "kernel_google_marlin is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh index 84decd90..9f7cf28a 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh @@ -411,6 +411,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch @@ -505,7 +506,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -519,9 +520,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-5d89eb01c93d8a62998e3bdccae28a7732e3bd51.patch @@ -532,7 +542,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p532" +editKernelLocalversion "-dos.p542" else echo "kernel_google_msm is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh index 5b3d38f8..a4a3c254 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh @@ -491,6 +491,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0057.patch @@ -615,7 +616,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -629,9 +630,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch @@ -642,7 +652,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p642" +editKernelLocalversion "-dos.p652" else echo "kernel_htc_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh index 73cf484f..e01b08df 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh @@ -421,6 +421,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0049.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch @@ -542,7 +543,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -556,9 +557,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -566,7 +576,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p566" +editKernelLocalversion "-dos.p576" else echo "kernel_lge_g3 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh index 1230102f..cf94aaf2 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh @@ -382,6 +382,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0057.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0061.patch @@ -479,7 +480,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -493,9 +494,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -504,7 +514,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p504" +editKernelLocalversion "-dos.p514" else echo "kernel_lge_hammerhead is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh index 8ed16e56..240992c8 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh @@ -65,6 +65,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48701/4.4/0001.patch @@ -122,7 +123,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -136,13 +137,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p142" +editKernelLocalversion "-dos.p152" else echo "kernel_lge_mako is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh index 1769357f..b6b59ead 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh @@ -409,6 +409,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0057.patch @@ -527,7 +528,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -541,16 +542,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p550" +editKernelLocalversion "-dos.p560" else echo "kernel_lge_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh index 10f8bcec..b40b0ee5 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh @@ -346,6 +346,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0065.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch @@ -477,8 +478,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27399/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27399/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -495,11 +496,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/1035495_0001-cnss-Add-NULL-check-for-PM-related-APIs.patch @@ -513,7 +528,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p513" +editKernelLocalversion "-dos.p528" else echo "kernel_moto_shamu is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh index 7229f456..5250c6e1 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh @@ -475,6 +475,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0057.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0061.patch @@ -596,7 +597,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -610,9 +611,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch @@ -621,7 +631,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p621" +editKernelLocalversion "-dos.p631" else echo "kernel_motorola_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh index a115413e..939ba003 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh @@ -555,6 +555,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch @@ -746,7 +749,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -767,14 +770,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15815/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch @@ -784,7 +801,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p784" +editKernelLocalversion "-dos.p801" else echo "kernel_motorola_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh index c181205a..1b1ca0cb 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh @@ -481,6 +481,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0063.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch @@ -612,7 +613,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -629,11 +630,25 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch @@ -643,7 +658,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p643" +editKernelLocalversion "-dos.p658" else echo "kernel_nextbit_msm8992 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh index 2829ad1e..b0e64e24 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh @@ -540,6 +540,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch @@ -734,7 +737,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27008/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -755,14 +758,28 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch @@ -772,7 +789,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p772" +editKernelLocalversion "-dos.p789" else echo "kernel_oneplus_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh index dd7e7828..9d92a083 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh @@ -351,6 +351,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0049.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch @@ -470,7 +471,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -484,14 +485,23 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p491" +editKernelLocalversion "-dos.p501" else echo "kernel_oppo_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh index ef15d241..c80da7ba 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh @@ -428,6 +428,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0071.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0072.patch @@ -543,7 +544,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -557,9 +558,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-check-in-pm_ops-unregister.patch @@ -570,7 +580,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p570" +editKernelLocalversion "-dos.p580" else echo "kernel_samsung_jf is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh index c2c5f2bc..857aafad 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh @@ -507,6 +507,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0060.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0071.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0072.patch @@ -625,7 +626,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -639,9 +640,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.4/0001.patch @@ -654,7 +664,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p654" +editKernelLocalversion "-dos.p664" else echo "kernel_samsung_msm8930-common is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh index e485ed83..2258202b 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh @@ -256,6 +256,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47520/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47521/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47547/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0049.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0055.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0056.patch @@ -356,7 +357,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26956/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26981/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26994/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27009/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -370,13 +371,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35821/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35828/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p376" +editKernelLocalversion "-dos.p386" else echo "kernel_samsung_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh index a9766065..56521360 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh @@ -70,6 +70,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch @@ -362,7 +363,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -385,25 +386,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p403" +editKernelLocalversion "-dos.p419" else echo "kernel_xiaomi_sdm660 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh index 483534ff..6b8a2bd1 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh @@ -516,6 +516,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47571/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47576/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47583/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47600/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47603/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47606/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47609/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0004.patch @@ -697,12 +707,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4244/4.19/0025.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.19/0004.patch @@ -926,6 +936,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -935,6 +946,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch @@ -944,7 +971,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p944" +editKernelLocalversion "-dos.p971" else echo "kernel_xiaomi_sm8150 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh index 9e210488..ea41fca9 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh @@ -117,6 +117,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch @@ -390,7 +391,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -413,20 +414,35 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch @@ -434,7 +450,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p434" +editKernelLocalversion "-dos.p450" else echo "kernel_essential_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh index a1224fdc..fb231a9c 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh @@ -72,6 +72,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0012.patch @@ -297,6 +299,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -308,6 +311,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -316,7 +332,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p316" +editKernelLocalversion "-dos.p332" else echo "kernel_fairphone_sdm632 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh index 66469200..8ffdb1e7 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh @@ -80,6 +80,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch @@ -101,6 +102,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch @@ -138,7 +140,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch @@ -149,7 +151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26642/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/^6.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26645/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26654/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26663/4.19/0002.patch @@ -253,6 +255,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35900/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35902/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.19/0003.patch @@ -274,6 +277,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36020/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.19/0002.patch @@ -291,12 +295,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38583/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38598/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch -editKernelLocalversion "-dos.p296" +editKernelLocalversion "-dos.p321" else echo "kernel_fairphone_sm7225 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh index d5660a90..54843105 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh @@ -66,6 +66,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch @@ -338,7 +339,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -361,25 +362,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p379" +editKernelLocalversion "-dos.p395" else echo "kernel_fxtec_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh index 4d726351..e919cb37 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh @@ -80,6 +80,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch @@ -101,6 +102,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch @@ -138,7 +140,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch @@ -149,7 +151,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26642/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/^6.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26645/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26654/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26663/4.19/0002.patch @@ -253,6 +255,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35900/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35902/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.19/0003.patch @@ -274,6 +277,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36020/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.19/0002.patch @@ -291,12 +295,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38583/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38598/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch -editKernelLocalversion "-dos.p296" +editKernelLocalversion "-dos.p321" else echo "kernel_fxtec_sm6115 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh index ce3dde92..b80f3013 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh @@ -50,6 +50,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47508/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47558/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47599/^5.15/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0480/4.9-^5.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.14/0008.patch @@ -398,7 +400,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24860/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/5.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26595/^6.7/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26597/5.10/0003.patch @@ -646,6 +648,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36005/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36006/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36007/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36008/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36020/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36029/^6.9/0001.patch @@ -669,6 +672,34 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36957/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36978/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38546/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38547/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38548/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38555/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38564/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38590/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38597/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38605/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch @@ -677,7 +708,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch -editKernelLocalversion "-dos.p677" +editKernelLocalversion "-dos.p708" else echo "kernel_google_gs101_private_gs-google is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh index fbca8fa5..c3630840 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh @@ -50,6 +50,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47508/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47558/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47599/^5.15/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0480/4.9-^5.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.13/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1280/^5.14/0008.patch @@ -396,7 +398,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24860/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/5.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26595/^6.7/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26597/5.10/0003.patch @@ -644,6 +646,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36005/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36006/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36007/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36008/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36020/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36029/^6.9/0001.patch @@ -667,6 +670,34 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36957/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36978/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38546/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38547/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38548/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38555/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38564/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38590/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38597/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38605/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.10/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.10/0003.patch @@ -675,7 +706,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.10/0004.patch -editKernelLocalversion "-dos.p675" +editKernelLocalversion "-dos.p706" else echo "kernel_google_gs201_private_gs-google is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh index 5b952034..e9042ca0 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh @@ -81,6 +81,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47346/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47583/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20382/ANY/0001.patch @@ -90,6 +92,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-48697/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.14/0004.patch @@ -265,6 +268,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -278,11 +282,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p282" +editKernelLocalversion "-dos.p302" else echo "kernel_google_msm-4.14 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh index c1b4af71..87f032ef 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh @@ -77,6 +77,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch @@ -300,6 +302,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -311,6 +314,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -319,7 +334,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p319" +editKernelLocalversion "-dos.p334" else echo "kernel_google_msm-4.9 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh index a3341dbd..53a3efb7 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh @@ -78,6 +78,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2873/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3104/^5.18/0001.patch @@ -175,9 +176,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4244/4.19/0025.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.19/0004.patch @@ -330,7 +331,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch @@ -342,7 +343,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26633/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26642/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/^6.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26645/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26651/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26654/4.19/0002.patch @@ -458,6 +459,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35900/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35902/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.19/0003.patch @@ -479,6 +481,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36020/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.19/0002.patch @@ -495,12 +498,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch -editKernelLocalversion "-dos.p500" +editKernelLocalversion "-dos.p521" else echo "kernel_google_redbull is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh index dc8e328f..0092f0fb 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh @@ -88,6 +88,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch @@ -355,7 +356,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -378,20 +379,35 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch @@ -399,7 +415,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p399" +editKernelLocalversion "-dos.p415" else echo "kernel_google_wahoo is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_lge_msm8996.sh index a76a72ce..5280e969 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_lge_msm8996.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_lge_msm8996.sh @@ -66,6 +66,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch @@ -338,7 +339,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -361,25 +362,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p379" +editKernelLocalversion "-dos.p395" else echo "kernel_lge_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh index 2459148f..e3cd2209 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh @@ -66,6 +66,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch @@ -342,7 +343,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -365,25 +366,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p383" +editKernelLocalversion "-dos.p399" else echo "kernel_oneplus_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh index 437275f3..16498b81 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh @@ -72,6 +72,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch @@ -301,6 +303,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -312,6 +315,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -320,7 +336,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p320" +editKernelLocalversion "-dos.p336" else echo "kernel_oneplus_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh index 9da3f1ca..6b94ef86 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh @@ -77,6 +77,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch @@ -97,6 +98,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6040/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.19/0004.patch @@ -166,7 +168,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch @@ -178,7 +180,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26633/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26642/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/^6.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26645/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26651/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26654/4.19/0002.patch @@ -304,6 +306,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35900/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35902/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.19/0003.patch @@ -325,6 +328,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36020/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.19/0002.patch @@ -342,12 +346,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38583/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38598/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch -editKernelLocalversion "-dos.p347" +editKernelLocalversion "-dos.p372" else echo "kernel_oneplus_sm7250 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh index c17c4a3b..b3623bd4 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh @@ -491,6 +491,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47571/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47576/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47583/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47600/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47603/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47606/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47609/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0004.patch @@ -664,12 +674,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4244/4.19/0025.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4622/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4921/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.19/0004.patch @@ -893,6 +903,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -902,6 +913,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch @@ -910,7 +937,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47222/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p910" +editKernelLocalversion "-dos.p937" else echo "kernel_oneplus_sm8150 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh index cf1ca19f..2172524d 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh @@ -78,6 +78,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch @@ -99,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch @@ -136,7 +138,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26600/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26602/4.19/0002.patch @@ -147,7 +149,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26625/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26635/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26636/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26642/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/^6.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26645/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26654/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26663/4.19/0002.patch @@ -251,6 +253,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35886/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35893/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35898/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35900/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35902/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35915/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35922/4.19/0003.patch @@ -272,6 +275,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36020/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.19/0002.patch @@ -289,12 +293,33 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38583/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38598/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/4.19/0003.patch -editKernelLocalversion "-dos.p294" +editKernelLocalversion "-dos.p319" else echo "kernel_oneplus_sm8250 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh index c88004ce..e6521e97 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh @@ -37,6 +37,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47488/5.3-^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47535/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47599/^5.15/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0480/4.9-^5.14/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch @@ -109,7 +111,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-23849/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24857/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24861/5.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/5.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-25739/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26581/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26595/^6.7/0001.patch @@ -314,6 +316,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36006/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36007/5.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/5.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36020/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/5.4/0005.patch @@ -333,6 +336,30 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/5.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/5.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36978/^6.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/5.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/5.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38555/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/5.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/5.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38583/5.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/5.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38598/5.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/5.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/5.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/5.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/5.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/5.4/0005.patch @@ -341,7 +368,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26812/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35812/5.4/0006.patch -editKernelLocalversion "-dos.p341" +editKernelLocalversion "-dos.p368" else echo "kernel_oneplus_sm8350 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh index 95a73f89..5c516d37 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh @@ -66,6 +66,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch @@ -338,7 +339,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -361,25 +362,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p379" +editKernelLocalversion "-dos.p395" else echo "kernel_razer_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh index 3ce270dc..18aa382c 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh @@ -72,6 +72,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch @@ -300,6 +302,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -311,6 +314,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -319,7 +335,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p319" +editKernelLocalversion "-dos.p335" else echo "kernel_razer_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh index 841bbf15..cb3af7f0 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh @@ -597,6 +597,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47571/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47576/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47600/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47606/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47609/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0009.patch @@ -899,6 +906,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -908,6 +916,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch @@ -915,7 +936,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p915" +editKernelLocalversion "-dos.p936" else echo "kernel_samsung_exynos9810 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm660.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm660.sh index 6737b8ba..344b7758 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm660.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm660.sh @@ -73,6 +73,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch @@ -355,7 +356,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -378,25 +379,40 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p396" +editKernelLocalversion "-dos.p412" else echo "kernel_sony_sdm660 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh index 4827028b..76623c83 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh @@ -428,6 +428,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47549/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47565/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47566/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47571/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47576/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47587/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47589/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47600/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47606/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47609/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0009.patch @@ -756,6 +764,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -765,6 +774,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -775,7 +797,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p775" +editKernelLocalversion "-dos.p797" else echo "kernel_sony_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh index fd7f9e31..74f9654e 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh @@ -68,6 +68,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0011.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0012.patch @@ -297,6 +299,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -308,6 +311,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -316,7 +332,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p316" +editKernelLocalversion "-dos.p332" else echo "kernel_xiaomi_msm8937 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh index b4d1890f..609177ca 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh @@ -74,6 +74,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47173/4.9/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0006.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0007.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1204/4.14/0008.patch @@ -304,6 +306,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -315,6 +318,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch @@ -323,7 +339,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p323" +editKernelLocalversion "-dos.p339" else echo "kernel_xiaomi_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh index 08348809..48b42c04 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh @@ -86,6 +86,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47346/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47583/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch @@ -100,6 +102,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6932/4.14/0002.patch @@ -299,6 +302,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -312,11 +316,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p316" +editKernelLocalversion "-dos.p336" else echo "kernel_xiaomi_sm6150 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh index 2b37c217..1f1660f3 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh @@ -80,6 +80,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47329/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47490/^5.15/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3108/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3625/^5.19/0001.patch @@ -101,6 +102,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4194/^6.5/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4623/4.12-^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28553/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-31083/^6.5/0001.patch @@ -111,8 +113,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52741/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52773/^6.7/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52817/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24855/^6.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/^6.8/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-24863/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26643/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26760/^6.8/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26771/^6.8/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-26861/^6.8/0001.patch @@ -145,6 +147,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35847/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35849/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35879/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35892/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35900/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35933/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch @@ -158,6 +161,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35984/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36883/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch @@ -174,8 +178,29 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36971/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38552/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38583/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38598/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.19/0007.patch -editKernelLocalversion "-dos.p175" +editKernelLocalversion "-dos.p200" else echo "kernel_xiaomi_sm8250 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_vayu.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_vayu.sh index e3e312c1..edcf5707 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_vayu.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_vayu.sh @@ -84,6 +84,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47266/^5.13/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47346/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47583/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47616/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch @@ -98,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1077/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/4.14/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4881/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6270/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6606/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-6932/4.14/0002.patch @@ -301,6 +304,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35978/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36004/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36017/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.19/0002.patch @@ -314,11 +318,27 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36959/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38549/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38559/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38578/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38579/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38612/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38618/4.19/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.19/0003.patch -editKernelLocalversion "-dos.p318" +editKernelLocalversion "-dos.p338" else echo "kernel_xiaomi_vayu is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh index cdac560b..5e1b8be8 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh @@ -71,6 +71,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47430/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47472/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-47588/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch @@ -353,7 +354,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27059/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27074/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27388/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27393/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27401/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27410/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27419/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27420/4.4/0001.patch @@ -376,26 +377,41 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35930/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35935/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35936/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35944/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35947/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35954/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35962/^6.9/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35969/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35982/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-35997/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/^6.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36886/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36902/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36919/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36934/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36941/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36950/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36954/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36960/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-36964/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38558/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38560/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38565/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38567/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38587/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38589/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38596/^6.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38599/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38601/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38607/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38613/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-38619/^6.10/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-52601/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27424/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2024-27425/4.4/0001.patch -editKernelLocalversion "-dos.p395" +editKernelLocalversion "-dos.p411" else echo "kernel_zuk_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE"