diff --git a/Patches/Linux b/Patches/Linux index a2761c74..6575c5c9 160000 --- a/Patches/Linux +++ b/Patches/Linux @@ -1 +1 @@ -Subproject commit a2761c7465e977fe2f0c578444ca96125e55974b +Subproject commit 6575c5c9c2d7186fd85701e3d049880545741ec0 diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh index e82963a2..09f9568b 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_amazon_hdx-common.sh @@ -768,7 +768,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22058/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch @@ -796,6 +796,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch @@ -807,7 +808,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p807" +editKernelLocalversion "-dos.p808" else echo "kernel_amazon_hdx-common is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh index 4fa21614..6f4c597b 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_asus_grouper.sh @@ -431,7 +431,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -457,6 +457,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch @@ -464,7 +465,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p464" +editKernelLocalversion "-dos.p465" else echo "kernel_asus_grouper is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh index f97a51af..76caa521 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8960.sh @@ -467,7 +467,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -493,6 +493,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch @@ -501,7 +502,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p501" +editKernelLocalversion "-dos.p502" else echo "kernel_htc_msm8960 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh index 8af7ebaa..800ee68d 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_htc_msm8994.sh @@ -529,7 +529,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/3.4/0009.patch @@ -543,6 +543,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -560,6 +561,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -572,7 +574,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p573" +editKernelLocalversion "-dos.p574" else echo "kernel_htc_msm8994 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh index 102a8d94..817c7361 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_lge_msm8992.sh @@ -616,7 +616,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -630,6 +630,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -647,6 +648,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -658,7 +660,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p659" +editKernelLocalversion "-dos.p660" else echo "kernel_lge_msm8992 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh index e4731ed1..ff4b3e81 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_d2.sh @@ -539,7 +539,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0042.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0043.patch @@ -568,6 +568,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch @@ -576,7 +577,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p576" +editKernelLocalversion "-dos.p577" else echo "kernel_samsung_d2 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh index ff50802d..93894282 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_exynos5420.sh @@ -225,7 +225,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch @@ -251,10 +251,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -editKernelLocalversion "-dos.p254" +editKernelLocalversion "-dos.p255" else echo "kernel_samsung_exynos5420 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh index a7b37de4..b09c68ce 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_manta.sh @@ -345,7 +345,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -371,13 +371,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p377" +editKernelLocalversion "-dos.p378" else echo "kernel_samsung_manta is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh index 66d52efd..5a98f094 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_smdk4412.sh @@ -401,7 +401,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -421,6 +421,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch @@ -428,7 +429,7 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-sy git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p428" +editKernelLocalversion "-dos.p429" else echo "kernel_samsung_smdk4412 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh index 47a40ab8..704e2dc9 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_tuna.sh @@ -395,7 +395,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -414,6 +414,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch @@ -421,7 +422,7 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-sy git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p421" +editKernelLocalversion "-dos.p422" else echo "kernel_samsung_tuna is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh index 0067605c..002aaca0 100644 --- a/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh +++ b/Scripts/LineageOS-14.1/CVE_Patchers/android_kernel_samsung_universal8890.sh @@ -722,10 +722,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch @@ -747,6 +747,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -768,6 +769,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch @@ -781,7 +783,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p782" +editKernelLocalversion "-dos.p783" else echo "kernel_samsung_universal8890 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh index 7000d799..97d92f0e 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_fugu.sh @@ -607,6 +607,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -621,7 +622,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -635,6 +636,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -652,6 +654,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -670,7 +673,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p671" +editKernelLocalversion "-dos.p673" else echo "kernel_asus_fugu is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh index 460db3bb..9a6e8e1e 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_asus_msm8916.sh @@ -418,7 +418,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima @@ -438,6 +438,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch @@ -454,6 +455,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -464,7 +466,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p465" +editKernelLocalversion "-dos.p466" else echo "kernel_asus_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh index 1618ddb1..0918eaaa 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_google_dragon.sh @@ -659,7 +659,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -681,11 +681,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20566/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch @@ -707,6 +707,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -728,6 +729,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch @@ -745,7 +747,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p746" +editKernelLocalversion "-dos.p747" else echo "kernel_google_dragon is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh index 83bf0977..3100a8bc 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_flounder.sh @@ -403,6 +403,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -418,7 +419,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -432,6 +433,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -449,6 +451,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -460,7 +463,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p461" +editKernelLocalversion "-dos.p463" else echo "kernel_htc_flounder is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh index 9db2de9a..5a99c397 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_huawei_angler.sh @@ -530,6 +530,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -545,7 +546,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -560,6 +561,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -577,6 +579,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -589,7 +592,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p590" +editKernelLocalversion "-dos.p592" else echo "kernel_huawei_angler is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh index e1eef4f1..14fda3d3 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_bullhead.sh @@ -538,6 +538,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0047.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0054.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -553,7 +554,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch @@ -571,6 +572,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -588,6 +590,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -600,7 +603,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p601" +editKernelLocalversion "-dos.p603" else echo "kernel_lge_bullhead is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh index e162e246..7b18939c 100644 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh +++ b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_zte_msm8996.sh @@ -638,7 +638,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -659,12 +659,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 @@ -688,6 +688,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -709,6 +710,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch @@ -721,7 +723,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p722" +editKernelLocalversion "-dos.p723" else echo "kernel_zte_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh index 13a29357..72d20974 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8916.sh @@ -416,7 +416,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima @@ -435,6 +435,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch @@ -451,6 +452,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -461,7 +463,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p462" +editKernelLocalversion "-dos.p463" else echo "kernel_cyanogen_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh index 40cbafb6..08375e57 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_cyanogen_msm8974.sh @@ -388,7 +388,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22058/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/3.4/0007.patch @@ -421,13 +421,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p427" +editKernelLocalversion "-dos.p428" else echo "kernel_cyanogen_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh index e364c68f..5eefbc7e 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_google_yellowstone.sh @@ -452,6 +452,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/3.4/0073.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -468,7 +469,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -482,6 +483,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -500,6 +502,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -510,7 +513,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p511" +editKernelLocalversion "-dos.p513" else echo "kernel_google_yellowstone is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh index 6350f67f..501312b8 100644 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh +++ b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_samsung_apq8084.sh @@ -272,7 +272,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch @@ -287,6 +287,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -303,6 +304,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -315,7 +317,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p316" +editKernelLocalversion "-dos.p317" else echo "kernel_samsung_apq8084 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh index 13a29357..72d20974 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_cyanogen_msm8916.sh @@ -416,7 +416,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/prima/0005.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/prima/0003.patch --directory=drivers/staging/prima @@ -435,6 +435,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0008.patch @@ -451,6 +452,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -461,7 +463,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p462" +editKernelLocalversion "-dos.p463" else echo "kernel_cyanogen_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh index 72bb506f..e1c3c03c 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8916.sh @@ -466,7 +466,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch @@ -487,6 +487,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0005.patch @@ -504,6 +505,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -513,7 +515,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p514" +editKernelLocalversion "-dos.p515" else echo "kernel_motorola_msm8916 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh index 868ecd34..72fd9c29 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_motorola_msm8992.sh @@ -387,7 +387,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -404,6 +404,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -421,6 +422,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -430,7 +432,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p431" +editKernelLocalversion "-dos.p432" else echo "kernel_motorola_msm8992 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh index 5b29e95d..fa1968ae 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh @@ -389,7 +389,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -406,6 +406,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -423,6 +424,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -432,7 +434,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p433" +editKernelLocalversion "-dos.p434" else echo "kernel_oneplus_msm8994 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh index bd5ac7d8..cea9b212 100644 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh +++ b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_yandex_sdm660.sh @@ -86,7 +86,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.4/0005.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19338/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19338/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/4.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.4/0004.patch @@ -339,7 +339,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch @@ -370,7 +370,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.4/0004.patch @@ -378,8 +378,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch @@ -409,6 +409,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch @@ -439,6 +440,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch @@ -456,7 +458,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0012.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p457" +editKernelLocalversion "-dos.p458" else echo "kernel_yandex_sdm660 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh index 919921c2..155bc34c 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fairphone_msm8974.sh @@ -218,7 +218,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/prima/0001.patch --directory=drivers/staging/prima git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.4/0008.patch @@ -237,9 +237,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch -editKernelLocalversion "-dos.p239" +editKernelLocalversion "-dos.p240" else echo "kernel_fairphone_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh index 18ac07b8..abfd7f66 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_marlin.sh @@ -451,7 +451,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -473,12 +473,12 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch @@ -505,6 +505,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -526,6 +527,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch @@ -540,7 +542,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p541" +editKernelLocalversion "-dos.p542" else echo "kernel_google_marlin is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh index dcd65b1c..f158a136 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_msm.sh @@ -388,7 +388,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -414,6 +414,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch @@ -423,7 +424,7 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/kernel.msm.git-7be3e08d7a5232 git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p423" +editKernelLocalversion "-dos.p424" else echo "kernel_google_msm is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh index accbd0e1..3e5f4082 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_htc_msm8974.sh @@ -490,7 +490,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22058/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/3.4/0007.patch @@ -523,6 +523,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0001/3.4/0002.patch @@ -532,7 +533,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p532" +editKernelLocalversion "-dos.p533" else echo "kernel_htc_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh index fb4afc89..04c41e6e 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_g3.sh @@ -416,7 +416,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22058/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/3.4/0007.patch @@ -448,13 +448,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p454" +editKernelLocalversion "-dos.p455" else echo "kernel_lge_g3 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh index 998ae24d..fd5c0014 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_hammerhead.sh @@ -356,7 +356,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0042.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0043.patch @@ -385,6 +385,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch @@ -392,7 +393,7 @@ git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/870057_0001-wcnss-add-null-ch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p392" +editKernelLocalversion "-dos.p393" else echo "kernel_lge_hammerhead is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh index 6eec8585..347321d0 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_mako.sh @@ -32,8 +32,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch -editKernelLocalversion "-dos.p33" +editKernelLocalversion "-dos.p34" else echo "kernel_lge_mako is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh index db1e8a64..82c10241 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8974.sh @@ -401,7 +401,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22058/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/3.4/0007.patch @@ -434,12 +434,13 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p439" +editKernelLocalversion "-dos.p440" else echo "kernel_lge_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh index f90236e7..68cef44d 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_moto_shamu.sh @@ -304,7 +304,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3564/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch @@ -320,6 +320,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -337,6 +338,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -350,7 +352,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p351" +editKernelLocalversion "-dos.p352" else echo "kernel_moto_shamu is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh index e3ebfc27..3ce690cc 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8974.sh @@ -466,7 +466,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22058/3.4/0003.patch @@ -500,6 +500,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch @@ -507,7 +508,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6752/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p507" +editKernelLocalversion "-dos.p508" else echo "kernel_motorola_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh index 87d00d72..ed0309b0 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_motorola_msm8996.sh @@ -468,7 +468,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -489,11 +489,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 @@ -518,6 +518,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -539,6 +540,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch @@ -551,7 +553,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p552" +editKernelLocalversion "-dos.p553" else echo "kernel_motorola_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh index 0a62d8ae..f8e4b5a0 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_nextbit_msm8992.sh @@ -441,7 +441,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/3.4/0009.patch @@ -458,6 +458,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc2/3.4/0004.patch @@ -474,6 +475,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch @@ -483,7 +485,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p484" +editKernelLocalversion "-dos.p485" else echo "kernel_nextbit_msm8992 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh index 94db4bd5..c32ac522 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oneplus_msm8996.sh @@ -453,7 +453,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -474,14 +474,14 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20399/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 @@ -506,6 +506,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch @@ -527,6 +528,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch @@ -539,7 +541,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p540" +editKernelLocalversion "-dos.p541" else echo "kernel_oneplus_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh index 0d368b08..93014914 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_oppo_msm8974.sh @@ -346,7 +346,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0042.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0043.patch @@ -377,10 +377,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch -editKernelLocalversion "-dos.p380" +editKernelLocalversion "-dos.p381" else echo "kernel_oppo_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh index 921c07f4..c9f4580a 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_jf.sh @@ -424,7 +424,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/3.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/3.4/0017.patch @@ -451,6 +451,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch @@ -460,7 +461,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p460" +editKernelLocalversion "-dos.p461" else echo "kernel_samsung_jf is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh index 9afbaee2..3f22df9d 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8930-common.sh @@ -503,7 +503,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0041.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0042.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20132/3.4/0043.patch @@ -533,6 +533,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0002/3.4/0001.patch @@ -544,7 +545,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/3.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch -editKernelLocalversion "-dos.p544" +editKernelLocalversion "-dos.p545" else echo "kernel_samsung_msm8930-common is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh index 136e2562..b9e080f3 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_samsung_msm8974.sh @@ -237,7 +237,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/^6.1/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/3.4/0010.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22058/3.4/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch @@ -263,9 +263,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch -editKernelLocalversion "-dos.p265" +editKernelLocalversion "-dos.p266" else echo "kernel_samsung_msm8974 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh index 1783a6d9..7f8dccac 100644 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh +++ b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_xiaomi_sdm660.sh @@ -63,10 +63,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -100,7 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch @@ -109,16 +109,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20399/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25654/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25664/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25743/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -145,6 +148,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch @@ -175,6 +179,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.4/0002.patch @@ -188,7 +193,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch -editKernelLocalversion "-dos.p189" +editKernelLocalversion "-dos.p193" else echo "kernel_xiaomi_sdm660 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_lge_msm8996.sh index 5825a5e5..8c838c48 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_lge_msm8996.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_lge_msm8996.sh @@ -60,10 +60,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -97,15 +97,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25677/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -132,6 +135,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch @@ -162,6 +166,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch @@ -172,7 +177,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch -editKernelLocalversion "-dos.p173" +editKernelLocalversion "-dos.p177" else echo "kernel_lge_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh index d6189589..17765f8c 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_sony_sdm660.sh @@ -68,10 +68,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -105,7 +105,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20009/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch @@ -114,16 +114,19 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20399/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20421/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20423/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25654/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25664/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25743/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -150,6 +153,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc4/4.4/0001.patch @@ -181,6 +185,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.4/0002.patch @@ -194,7 +199,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch -editKernelLocalversion "-dos.p195" +editKernelLocalversion "-dos.p199" else echo "kernel_sony_sdm660 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh index 508cb3f5..e863cf4b 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8150.sh @@ -448,6 +448,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch @@ -492,6 +493,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22387/ANY/0003.patch @@ -514,7 +516,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.14/0002.patch -editKernelLocalversion "-dos.p515" +editKernelLocalversion "-dos.p516" else echo "kernel_xiaomi_sm8150 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh index 9f588459..518a5a0c 100644 --- a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_xiaomi_sm8250.sh @@ -508,6 +508,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.19/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch @@ -562,6 +563,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4133/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4134/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.19/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22386/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22387/ANY/0003.patch @@ -589,9 +591,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.19/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch +#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22095/ANY/0001.patch -editKernelLocalversion "-dos.p592" +editKernelLocalversion "-dos.p593" else echo "kernel_xiaomi_sm8250 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh index a27d635b..67a5749f 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_essential_msm8998.sh @@ -110,10 +110,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -148,13 +148,16 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26490/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch @@ -182,6 +185,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch @@ -211,6 +215,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch @@ -225,7 +230,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch -editKernelLocalversion "-dos.p226" +editKernelLocalversion "-dos.p230" else echo "kernel_essential_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh index 239eece7..e4c9b554 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sdm632.sh @@ -77,6 +77,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch @@ -99,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch @@ -114,7 +116,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000 git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch -editKernelLocalversion "-dos.p115" +editKernelLocalversion "-dos.p116" else echo "kernel_fairphone_sdm632 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh index 0d673604..23e28e96 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fairphone_sm7225.sh @@ -80,6 +80,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0004.patch diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh index b31d1a75..07d74f4c 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_msm8998.sh @@ -60,10 +60,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -97,15 +97,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25677/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -132,6 +135,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch @@ -162,6 +166,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch @@ -172,7 +177,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch -editKernelLocalversion "-dos.p173" +editKernelLocalversion "-dos.p177" else echo "kernel_fxtec_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh index 0ad2a603..060deb2b 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_fxtec_sm6115.sh @@ -80,6 +80,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0004.patch diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh index a1ee9823..8ba64344 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs101_private_gs-google.sh @@ -62,9 +62,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39189/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0179/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/5.10/0004.patch @@ -112,6 +114,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3389/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3772/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4004/5.10/0002.patch @@ -151,7 +155,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35826/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35829/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/5.10/0004.patch -editKernelLocalversion "-dos.p152" +editKernelLocalversion "-dos.p155" else echo "kernel_google_gs101_private_gs-google is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh index a6d24ab3..1cd42817 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_gs201_private_gs-google.sh @@ -62,9 +62,11 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20158/^5.15/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39189/5.10/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/5.10/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/ANY/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/5.10/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0179/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/5.10/0004.patch @@ -112,6 +114,8 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3389/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3772/5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/5.10/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4004/5.10/0002.patch @@ -149,7 +153,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35826/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/5.10/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35829/5.10/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/5.10/0004.patch -editKernelLocalversion "-dos.p150" +editKernelLocalversion "-dos.p153" else echo "kernel_google_gs201_private_gs-google is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh index 904d2d2a..76012b43 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.14.sh @@ -74,6 +74,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4382/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20382/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch @@ -108,6 +109,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch @@ -126,7 +128,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch -editKernelLocalversion "-dos.p127" +editKernelLocalversion "-dos.p128" else echo "kernel_google_msm-4.14 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh index d5276658..ac073571 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_msm-4.9.sh @@ -83,6 +83,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25722/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33225/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch @@ -105,6 +106,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch @@ -120,7 +122,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000 git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch -editKernelLocalversion "-dos.p121" +editKernelLocalversion "-dos.p122" else echo "kernel_google_msm-4.9 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh index 3c6c7006..9bd6376c 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_redbull.sh @@ -100,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40982/4.19/0028.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40982/4.19/0029.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40982/4.19/0030.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40982/4.19/0031.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch @@ -140,6 +141,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3220/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3567/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0004.patch @@ -169,7 +171,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.19/0003.patch -editKernelLocalversion "-dos.p170" +editKernelLocalversion "-dos.p171" else echo "kernel_google_redbull is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh index b2a5efbb..76befbd4 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_google_wahoo.sh @@ -80,10 +80,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -117,12 +117,15 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch @@ -146,6 +149,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch @@ -175,6 +179,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-20941/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch @@ -189,7 +194,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0004.patch -editKernelLocalversion "-dos.p190" +editKernelLocalversion "-dos.p194" else echo "kernel_google_wahoo is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh index cfe47df3..82a4255b 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_msm8998.sh @@ -60,10 +60,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -97,15 +97,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25677/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -132,6 +135,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch @@ -162,6 +166,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch @@ -172,7 +177,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch -editKernelLocalversion "-dos.p173" +editKernelLocalversion "-dos.p177" else echo "kernel_oneplus_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh index dba367c6..281ec010 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sdm845.sh @@ -77,6 +77,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25722/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33225/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch @@ -99,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch @@ -114,7 +116,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000 git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch -editKernelLocalversion "-dos.p115" +editKernelLocalversion "-dos.p116" else echo "kernel_oneplus_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh index 916e8e06..a15c2900 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm7250.sh @@ -74,6 +74,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.19/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.19/0003.patch @@ -98,6 +99,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3220/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0004.patch @@ -122,7 +124,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.19/0003.patch -editKernelLocalversion "-dos.p123" +editKernelLocalversion "-dos.p124" else echo "kernel_oneplus_sm7250 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh index 21359e74..fb7a8faf 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8150.sh @@ -415,6 +415,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch @@ -459,6 +460,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.14/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22387/ANY/0003.patch @@ -480,7 +482,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.14/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.14/0002.patch -editKernelLocalversion "-dos.p481" +editKernelLocalversion "-dos.p482" else echo "kernel_oneplus_sm8150 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh index 1abe050f..624aa62f 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8250.sh @@ -77,6 +77,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.19/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0004.patch diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh index 799847ec..e6f23d19 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_oneplus_sm8350.sh @@ -27,7 +27,9 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3903/^6.0/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/5.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39189/5.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/5.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-OctWirelessASB/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0160/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1380/5.4/0006.patch @@ -37,6 +39,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2269/5.4/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3006/5.4/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3338/5.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/5.4/0012.patch @@ -58,7 +61,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/5.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35826/^6.3/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/5.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/5.4/0006.patch -editKernelLocalversion "-dos.p59" +editKernelLocalversion "-dos.p61" else echo "kernel_oneplus_sm8350 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh index 211c0f9d..0c00bd1c 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_msm8998.sh @@ -60,10 +60,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -97,15 +97,18 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25677/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -132,6 +135,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch @@ -162,6 +166,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch @@ -172,7 +177,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch -editKernelLocalversion "-dos.p173" +editKernelLocalversion "-dos.p177" else echo "kernel_razer_msm8998 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh index 68033bbd..5d7fad2a 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_razer_sdm845.sh @@ -77,6 +77,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25722/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33225/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch @@ -99,6 +100,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch @@ -114,7 +116,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000 git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch -editKernelLocalversion "-dos.p115" +editKernelLocalversion "-dos.p116" else echo "kernel_razer_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh index fb38b3c5..f1b6039d 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_samsung_exynos9810.sh @@ -553,6 +553,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch @@ -585,6 +586,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28772/4.9/0005.patch @@ -599,7 +601,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.pat git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/4.9/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch -editKernelLocalversion "-dos.p600" +editKernelLocalversion "-dos.p601" else echo "kernel_samsung_exynos9810 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh index 18fc1ca8..14f3317f 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_sony_sdm845.sh @@ -384,6 +384,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/^6.1/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.9/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch @@ -418,6 +419,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.9/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21656/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-21657/4.9/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-22387/ANY/0004.patch @@ -438,7 +440,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.pat git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch -editKernelLocalversion "-dos.p439" +editKernelLocalversion "-dos.p440" else echo "kernel_sony_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh index 33eae3a2..615759cc 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_msm8937.sh @@ -74,6 +74,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20369/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20371/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch @@ -97,6 +98,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch @@ -113,7 +115,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000 git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch -editKernelLocalversion "-dos.p114" +editKernelLocalversion "-dos.p115" else echo "kernel_xiaomi_msm8937 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh index 102e296e..f3f71a9e 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sdm845.sh @@ -79,6 +79,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25722/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28388/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33225/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.14/0003.patch #git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0461/4.14/0002.patch @@ -101,6 +102,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2985/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.14/0003.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3358/4.14/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.6-^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch @@ -116,7 +118,7 @@ git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-fortify/4.9/000 git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0016.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0029.patch git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.9/0005.patch -editKernelLocalversion "-dos.p117" +editKernelLocalversion "-dos.p118" else echo "kernel_xiaomi_sdm845 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh index f18818f3..1a6269b8 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm6150.sh @@ -75,6 +75,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/4.14/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4132/4.14/0004.patch @@ -82,7 +83,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23000/^5.16/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34319/4.14/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35001/4.14/0006.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.14/0002.patch -editKernelLocalversion "-dos.p82" +editKernelLocalversion "-dos.p83" else echo "kernel_xiaomi_sm6150 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh index 8093f4e5..93f1467f 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_xiaomi_sm8250.sh @@ -75,6 +75,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20571/ANY/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0030/^4.20/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0386/^6.2/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1206/4.19/0003.patch @@ -86,6 +87,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3090/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3141/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3212/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3609/4.19/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3773/^6.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3776/4.19/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3777/^6.5/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4128/4.19/0004.patch @@ -102,7 +104,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35823/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.19/0004.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35828/4.19/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-40283/4.19/0003.patch -editKernelLocalversion "-dos.p103" +editKernelLocalversion "-dos.p104" else echo "kernel_xiaomi_sm8250 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh index 33486e25..2cfb10d2 100644 --- a/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh +++ b/Scripts/LineageOS-20.0/CVE_Patchers/android_kernel_zuk_msm8996.sh @@ -65,10 +65,10 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.4/0014.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0021.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.4/0022.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch @@ -102,19 +102,22 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.4/0015.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22064/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-22065/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.4/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.4/0005.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25677/ANY/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25720/qcacld-2.0/0004.patch --directory=drivers/staging/qcacld-2.0 +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26365/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch @@ -141,6 +144,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45919/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch @@ -170,6 +174,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3159/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-3161/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4385/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4387/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-4459/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch @@ -181,7 +186,7 @@ git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-34256/4.4/0008.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-35824/4.4/0001.patch git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0 -editKernelLocalversion "-dos.p181" +editKernelLocalversion "-dos.p186" else echo "kernel_zuk_msm8996 is unavailable, not patching."; fi; cd "$DOS_BUILD_BASE"