From 3457fd4151d4bfd4980352f36dcc24a2f4b0bd6c Mon Sep 17 00:00:00 2001 From: Tad Date: Tue, 26 Apr 2022 12:19:11 -0400 Subject: [PATCH] Device cleanup Drop long non-compiling devices: - 14.1: n7100, jellypro - 15.1: himaul, oneplus2 - 16.0: zenfone3, fugu - 17.1: yellowstone, fugu - 18.1: bonito, sargo Drop in favor of 19.1: - 17.1: bonito, sargo - 18.1: pro1, aura, sunfish, coral, flame, bramble, redfin (experimental, but these devices don't currently appear to have any users) Signed-off-by: Tad --- Manifests/Manifest_LAOS-14.1.xml | 7 - Manifests/Manifest_LAOS-15.1.xml | 10 - Manifests/Manifest_LAOS-16.0.xml | 8 - Manifests/Manifest_LAOS-17.1.xml | 14 - Manifests/Manifest_LAOS-18.1.xml | 31 - Scripts/Common/Functions.sh | 2 +- Scripts/LineageOS-14.1/Functions.sh | 3 - Scripts/LineageOS-14.1/Patch.sh | 6 - .../android_kernel_htc_msm8994.sh | 527 --------------- .../android_kernel_oneplus_msm8994.sh | 380 ----------- Scripts/LineageOS-15.1/Functions.sh | 5 +- Scripts/LineageOS-15.1/Patch.sh | 4 - .../CVE_Patchers/android_kernel_asus_fugu.sh | 600 ------------------ .../android_kernel_asus_msm8953.sh | 418 ------------ Scripts/LineageOS-16.0/Functions.sh | 4 - Scripts/LineageOS-16.0/Patch.sh | 7 +- .../CVE_Patchers/android_kernel_asus_fugu.sh | 600 ------------------ .../android_kernel_google_msm-4.9.sh | 390 ------------ .../android_kernel_google_yellowstone.sh | 442 ------------- Scripts/LineageOS-17.1/Functions.sh | 9 +- Scripts/LineageOS-17.1/Patch.sh | 6 - .../android_kernel_fxtec_msm8998.sh | 69 -- .../android_kernel_google_coral.sh | 247 ------- .../android_kernel_google_redbull.sh | 277 -------- .../android_kernel_google_sunfish.sh | 243 ------- .../android_kernel_razer_sdm845.sh | 101 --- Scripts/LineageOS-18.1/Functions.sh | 14 +- Scripts/LineageOS-18.1/Patch.sh | 8 - Scripts/LineageOS-19.1/Patch.sh | 5 +- 29 files changed, 6 insertions(+), 4431 deletions(-) delete mode 100644 Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_msm8994.sh delete mode 100644 Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh delete mode 100644 Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_asus_fugu.sh delete mode 100644 Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_asus_msm8953.sh delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_asus_fugu.sh delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_msm-4.9.sh delete mode 100644 Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_yellowstone.sh delete mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh delete mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_coral.sh delete mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_redbull.sh delete mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_sunfish.sh delete mode 100644 Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_razer_sdm845.sh diff --git a/Manifests/Manifest_LAOS-14.1.xml b/Manifests/Manifest_LAOS-14.1.xml index c9ffe18a..c18c8fa7 100644 --- a/Manifests/Manifest_LAOS-14.1.xml +++ b/Manifests/Manifest_LAOS-14.1.xml @@ -136,9 +136,6 @@ - - - @@ -178,10 +175,6 @@ - - - - diff --git a/Manifests/Manifest_LAOS-15.1.xml b/Manifests/Manifest_LAOS-15.1.xml index 2dedd116..ae5f8321 100644 --- a/Manifests/Manifest_LAOS-15.1.xml +++ b/Manifests/Manifest_LAOS-15.1.xml @@ -98,11 +98,6 @@ - - - - - @@ -145,11 +140,6 @@ - - - - - diff --git a/Manifests/Manifest_LAOS-16.0.xml b/Manifests/Manifest_LAOS-16.0.xml index 000ac2cf..89e1329c 100644 --- a/Manifests/Manifest_LAOS-16.0.xml +++ b/Manifests/Manifest_LAOS-16.0.xml @@ -89,10 +89,6 @@ - - - - @@ -102,10 +98,6 @@ - - - - diff --git a/Manifests/Manifest_LAOS-17.1.xml b/Manifests/Manifest_LAOS-17.1.xml index 0a6f122e..a69bfba9 100644 --- a/Manifests/Manifest_LAOS-17.1.xml +++ b/Manifests/Manifest_LAOS-17.1.xml @@ -82,16 +82,6 @@ - - - - - - - - - - @@ -112,10 +102,6 @@ - - - - diff --git a/Manifests/Manifest_LAOS-18.1.xml b/Manifests/Manifest_LAOS-18.1.xml index d3a3c076..87341892 100644 --- a/Manifests/Manifest_LAOS-18.1.xml +++ b/Manifests/Manifest_LAOS-18.1.xml @@ -94,10 +94,6 @@ - - - - @@ -123,29 +119,6 @@ - - - - - - - - - - - - - - - - - - - - - - - @@ -254,10 +227,6 @@ - - - - diff --git a/Scripts/Common/Functions.sh b/Scripts/Common/Functions.sh index 8faaf354..e3381d9d 100644 --- a/Scripts/Common/Functions.sh +++ b/Scripts/Common/Functions.sh @@ -757,7 +757,7 @@ getDefconfig() { else #grep TARGET_KERNEL_CONFIG /mnt/dos/Build/*/device/ -Rih | sed 's|TARGET_KERNEL_CONFIG .= |arch/arm\*/configs/|' | grep -v lineage | sort -u #grep TARGET_KERNEL_VARIANT_CONFIG /mnt/dos/Build/*/device/ -Rih | sed 's|TARGET_KERNEL_VARIANT_CONFIG .= |arch/arm\*/configs/|' | grep -v lineage | sort -u - local defconfigPath="arch/arm*/configs/lineage*defconfig arch/arm*/configs/apollo_defconfig arch/arm*/configs/apq8084_sec_defconfig arch/arm*/configs/apq8084_sec_kccat6_eur_defconfig arch/arm*/configs/apq8084_sec_lentislte_skt_defconfig arch/arm*/configs/aura_defconfig arch/arm*/configs/b1c1_defconfig arch/arm*/configs/beryllium_defconfig arch/arm*/configs/bonito_defconfig arch/arm*/configs/clark_defconfig arch/arm*/configs/discovery_defconfig arch/arm*/configs/enchilada_defconfig arch/arm*/configs/exynos8890-hero2lte_defconfig arch/arm*/configs/exynos8890-herolte_defconfig arch/arm*/configs/floral_defconfig arch/arm*/configs/griffin_defconfig arch/arm*/configs/grouper_defconfig arch/arm*/configs/harpia_defconfig arch/arm*/configs/jf_att_defconfig arch/arm*/configs/jf_eur_defconfig arch/arm*/configs/jf_spr_defconfig arch/arm*/configs/jf_vzw_defconfig arch/arm*/configs/lavender_defconfig arch/arm*/configs/m1s1_defconfig arch/arm*/configs/m7_defconfig arch/arm*/configs/m8_defconfig arch/arm*/configs/m8dug_defconfig arch/arm*/configs/merlin_defconfig arch/arm*/configs/msm8930_serrano_eur_3g_defconfig arch/arm*/configs/msm8930_serrano_eur_lte_defconfig arch/arm*/configs/msm8974-hdx_defconfig arch/arm*/configs/msm8974-hdx-perf_defconfig arch/arm*/configs/oneplus2_defconfig arch/arm*/configs/osprey_defconfig arch/arm*/configs/pioneer_defconfig arch/arm*/configs/redbull_defconfig arch/arm*/configs/samsung_serrano_defconfig arch/arm*/configs/samsung_serrano_usa_defconfig arch/arm*/configs/shamu_defconfig arch/arm*/configs/sunfish_defconfig arch/arm*/configs/surnia_defconfig arch/arm*/configs/tama_akari_defconfig arch/arm*/configs/tama_apollo_defconfig arch/arm*/configs/tama_aurora_defconfig arch/arm*/configs/thor_defconfig arch/arm*/configs/tuna_defconfig arch/arm*/configs/twrp_defconfig arch/arm*/configs/vendor/alioth_defconfig arch/arm*/configs/vendor/lineage_davinci_defconfig arch/arm*/configs/vendor/lito-perf_defconfig arch/arm*/configs/vendor/lmi_defconfig arch/arm*/configs/vendor/raphael_defconfig arch/arm*/configs/vendor/sm8150-perf_defconfig arch/arm*/configs/vendor/vayu_defconfig arch/arm*/configs/voyager_defconfig arch/arm*/configs/yellowstone_defconfig arch/arm*/configs/Z00T_defconfig arch/arm*/configs/z2_plus_defconfig arch/arm*/configs/zenfone3-perf_defconfig"; + local defconfigPath="arch/arm*/configs/lineage*defconfig arch/arm*/configs/vendor/lineage*defconfig arch/arm*/configs/apollo_defconfig arch/arm*/configs/apq8084_sec_defconfig arch/arm*/configs/apq8084_sec_kccat6_eur_defconfig arch/arm*/configs/apq8084_sec_lentislte_skt_defconfig arch/arm*/configs/aura_defconfig arch/arm*/configs/b1c1_defconfig arch/arm*/configs/beryllium_defconfig arch/arm*/configs/bonito_defconfig arch/arm*/configs/clark_defconfig arch/arm*/configs/discovery_defconfig arch/arm*/configs/enchilada_defconfig arch/arm*/configs/exynos8890-hero2lte_defconfig arch/arm*/configs/exynos8890-herolte_defconfig arch/arm*/configs/floral_defconfig arch/arm*/configs/griffin_defconfig arch/arm*/configs/grouper_defconfig arch/arm*/configs/harpia_defconfig arch/arm*/configs/jf_att_defconfig arch/arm*/configs/jf_eur_defconfig arch/arm*/configs/jf_spr_defconfig arch/arm*/configs/jf_vzw_defconfig arch/arm*/configs/lavender_defconfig arch/arm*/configs/m1s1_defconfig arch/arm*/configs/m7_defconfig arch/arm*/configs/m8_defconfig arch/arm*/configs/m8dug_defconfig arch/arm*/configs/merlin_defconfig arch/arm*/configs/msm8930_serrano_eur_3g_defconfig arch/arm*/configs/msm8930_serrano_eur_lte_defconfig arch/arm*/configs/msm8974-hdx_defconfig arch/arm*/configs/msm8974-hdx-perf_defconfig arch/arm*/configs/oneplus2_defconfig arch/arm*/configs/osprey_defconfig arch/arm*/configs/pioneer_defconfig arch/arm*/configs/redbull_defconfig arch/arm*/configs/samsung_serrano_defconfig arch/arm*/configs/samsung_serrano_usa_defconfig arch/arm*/configs/shamu_defconfig arch/arm*/configs/sunfish_defconfig arch/arm*/configs/surnia_defconfig arch/arm*/configs/tama_akari_defconfig arch/arm*/configs/tama_apollo_defconfig arch/arm*/configs/tama_aurora_defconfig arch/arm*/configs/thor_defconfig arch/arm*/configs/tuna_defconfig arch/arm*/configs/twrp_defconfig arch/arm*/configs/vendor/alioth_defconfig arch/arm*/configs/vendor/lito-perf_defconfig arch/arm*/configs/vendor/lmi_defconfig arch/arm*/configs/vendor/raphael_defconfig arch/arm*/configs/vendor/sm8150-perf_defconfig arch/arm*/configs/vendor/vayu_defconfig arch/arm*/configs/voyager_defconfig arch/arm*/configs/yellowstone_defconfig arch/arm*/configs/Z00T_defconfig arch/arm*/configs/z2_plus_defconfig arch/arm*/configs/zenfone3-perf_defconfig"; fi; echo $defconfigPath; } diff --git a/Scripts/LineageOS-14.1/Functions.sh b/Scripts/LineageOS-14.1/Functions.sh index 696b053e..22ada1ec 100644 --- a/Scripts/LineageOS-14.1/Functions.sh +++ b/Scripts/LineageOS-14.1/Functions.sh @@ -83,7 +83,6 @@ buildAll() { buildDevice himawl; #Exynos buildDevice manta; - #buildDevice n7100; #broken sepolicy buildDeviceUserDebug i9100; buildDeviceUserDebug i9300; buildDeviceUserDebug i9305; @@ -99,8 +98,6 @@ buildAll() { buildDevice toroplus; #Tegra buildDevice grouper; #needs manual patching - one-repo vendor blob patch - #MediaTek - buildDeviceUserDebug jellypro; #XXX: blob kernel and permissive selinux } export -f buildAll; diff --git a/Scripts/LineageOS-14.1/Patch.sh b/Scripts/LineageOS-14.1/Patch.sh index aef97ce1..c3dddf4a 100644 --- a/Scripts/LineageOS-14.1/Patch.sh +++ b/Scripts/LineageOS-14.1/Patch.sh @@ -382,10 +382,6 @@ echo "allow system_server system_file:file execmod;" >> sepolicy/system_server.t echo "PRODUCT_PROPERTY_OVERRIDES += persist.sys.force_highendgfx=true" >> device.mk; #override low_ram to fix artifacting fi; -if enterAndClear "device/unihertz/jellypro"; then -sed -i 's/androidboot.selinux=disabled//' BoardConfig.mk; -fi; - if enter "vendor/google"; then echo "" > atv/atv-common.mk; fi; @@ -418,7 +414,6 @@ enableLowRam "device/samsung/smdk4412-common"; enableLowRam "device/samsung/toro"; enableLowRam "device/samsung/toroplus"; enableLowRam "device/samsung/tuna"; -enableLowRam "device/unihertz/jellypro"; #Tweaks for <3GB RAM devices #enableLowRam "device/amazon/apollo"; #enableLowRam "device/amazon/hdx-common"; @@ -437,7 +432,6 @@ enableLowRam "device/unihertz/jellypro"; #enableLowRam "device/samsung/n5100"; #enableLowRam "device/samsung/n5110"; #enableLowRam "device/samsung/n5120"; -#enableLowRam "device/samsung/n7100"; #Fixes #Fix broken options enabled by hardenDefconfig() diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_msm8994.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_msm8994.sh deleted file mode 100644 index c9c2f7cd..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_htc_msm8994.sh +++ /dev/null @@ -1,527 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/htc/msm8994" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0088-0089.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0093-0094.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9903/^3.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/^3.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4036/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4170/3.10-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4692/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5283/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5697/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8539/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8543/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8962/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9289/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0843/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3951/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6693/ANY/0002-merged.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8658/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0445/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6214/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7308/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7373/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8890/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9075/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11033/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11045/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13166/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13216/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18165/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18193/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18241/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18257/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13099/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.0-^3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0003/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/LVT-2017-0004/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p523" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh deleted file mode 100644 index 66a5fe31..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_oneplus_msm8994.sh +++ /dev/null @@ -1,380 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/oneplus/msm8994" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004-No_dir-relax.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9904/^3.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8234/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8243/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8281/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9711/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9723/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3565/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3566/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3567/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3580/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3584/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3585/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-3597/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5824/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5836/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5842/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5842/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5848/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5858/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5863/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5864/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5908/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11265/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11293/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11296/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11860/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11894/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11902/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11919/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11927/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11955/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11980/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12011/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13890/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2297/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2299/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2307/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2310/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10505/qcacld-2.0/0003.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10507/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10536/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10542/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10557/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10566/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3665/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11116/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11131/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.0-^3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20265/4.4/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -editKernelLocalversion "-dos.p376" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/Functions.sh b/Scripts/LineageOS-15.1/Functions.sh index bf0f99c4..9f12e0cd 100644 --- a/Scripts/LineageOS-15.1/Functions.sh +++ b/Scripts/LineageOS-15.1/Functions.sh @@ -19,7 +19,7 @@ umask 0022; #Last verified: 2021-10-16 patchAllKernels() { - startPatcher "kernel_asus_fugu kernel_asus_msm8916 kernel_google_dragon kernel_google_msm kernel_htc_flounder kernel_htc_msm8994 kernel_huawei_angler kernel_lge_bullhead kernel_lge_hammerhead kernel_lge_msm8996 kernel_moto_shamu kernel_nextbit_msm8992 kernel_oneplus_msm8994 kernel_zte_msm8996"; + startPatcher "kernel_asus_fugu kernel_asus_msm8916 kernel_google_dragon kernel_google_msm kernel_htc_flounder kernel_huawei_angler kernel_lge_bullhead kernel_lge_hammerhead kernel_lge_msm8996 kernel_moto_shamu kernel_nextbit_msm8992 kernel_zte_msm8996"; } export -f patchAllKernels; @@ -65,9 +65,6 @@ buildAll() { buildDevice angler verity; buildDevice bullhead verity; buildDevice ether; #Last version with working IMS - #SD810 - #buildDevice himaul; #broken - needs vendor bits - #buildDevice oneplus2; #Last version with working IMS + broken - needs vendor patching #SD615 buildDevice Z00T; #SD820 diff --git a/Scripts/LineageOS-15.1/Patch.sh b/Scripts/LineageOS-15.1/Patch.sh index 58331d40..8ab8834c 100644 --- a/Scripts/LineageOS-15.1/Patch.sh +++ b/Scripts/LineageOS-15.1/Patch.sh @@ -312,10 +312,6 @@ fi; #git revert --no-edit 05fb49518049440f90423341ff25d4f75f10bc0c; #restore releasetools #TODO #fi; -if enterAndClear "device/oneplus/oneplus2"; then -sed -i 's|etc/permissions/qti_libpermissions.xml|vendor/etc/permissions/qti_libpermissions.xml|' proprietary-files.txt; #Fix outdated path -fi; - #Make changes to all devices cd "$DOS_BUILD_BASE"; find "hardware/qcom/gps" -name "gps\.conf" -type f -print0 | xargs -0 -n 1 -P 4 -I {} bash -c 'hardenLocationConf "{}"'; diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_asus_fugu.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_asus_fugu.sh deleted file mode 100644 index d6864545..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_asus_fugu.sh +++ /dev/null @@ -1,600 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/asus/fugu" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4345/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4579/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4587/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6367/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6368/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6376/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6378/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6380/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6381/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6382/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6885/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7026/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7266/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7339/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0038/^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0049/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0055/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0077/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0100/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0101/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0155/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0206/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1438/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1446/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1690/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1737/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1738/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2039/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2309/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2523/3.10/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2568/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2673/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2678/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3122/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3673/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4608/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4653/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4943/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6410/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7145/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7207/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7283/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7825/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7843/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7970/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8086/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8884/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9420/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9683/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9710/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9715/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0239/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0275/^4.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1420/3.2-^3.19.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2666/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4036/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4692/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5283/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5697/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8539/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8543/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8962/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9289/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2053/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2438/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8658/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0449/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15121/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17712/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000251/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.10/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3837/^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.0-^3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p596" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_asus_msm8953.sh b/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_asus_msm8953.sh deleted file mode 100644 index 729f17a2..00000000 --- a/Scripts/LineageOS-16.0/CVE_Patchers/android_kernel_asus_msm8953.sh +++ /dev/null @@ -1,418 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/asus/msm8953" -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0750/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9605/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13162/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5825/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10536/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15239/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25045/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3699/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11116/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11131/qcacld-2.0/0001.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26146/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27675/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.4/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20265/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30319/qcacld-2.0/0002.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30337/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc2/ANY/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26145/qcacld-2.0/0008.patch --directory=drivers/staging/qcacld-2.0 -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p414" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-16.0/Functions.sh b/Scripts/LineageOS-16.0/Functions.sh index 8c3b5717..a8489596 100644 --- a/Scripts/LineageOS-16.0/Functions.sh +++ b/Scripts/LineageOS-16.0/Functions.sh @@ -63,14 +63,10 @@ buildAll() { buildDevice lentislte; #SD615 buildDevice kipper; - #SD625 - #buildDevice zenfone3; #broken - ninja: error: 'android.hidl.base@1.0.so', missing and no known rule to make it #SD430 buildDevice land; #SD435 buildDevice santoni; - #Intel - #buildDevice fugu; #broken - ninja: error: 'libpcre2.so' missing and no known rule to make it #Tegra buildDevice yellowstone; #broken sepolicy? } diff --git a/Scripts/LineageOS-16.0/Patch.sh b/Scripts/LineageOS-16.0/Patch.sh index 69c63f8e..04636db0 100644 --- a/Scripts/LineageOS-16.0/Patch.sh +++ b/Scripts/LineageOS-16.0/Patch.sh @@ -365,10 +365,6 @@ fi; # #START OF DEVICE CHANGES # -if enterAndClear "device/asus/zenfone3"; then -rm -rf libhidl; #breaks other devices -fi; - if enterAndClear "device/lge/hammerhead"; then git am $DOS_PATCHES/android_device_lge_hammerhead/*.patch; #hh-p-sepolicy echo "SELINUX_IGNORE_NEVERALLOWS := true" >> BoardConfig.mk; #qcom-legacy sepolicy @@ -392,13 +388,12 @@ deblobAudio || true; removeBuildFingerprints || true; #Tweaks for <2GB RAM devices -enableLowRam "device/asus/fugu" "fugu"; +#none yet #Tweaks for <3GB RAM devices #enableLowRam "device/lge/hammerhead" "hammerhead"; #enableLowRam "device/samsung/kccat6" "kccat6"; #Fix broken options enabled by hardenDefconfig() -sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/asus/msm8953/arch/arm64/configs/*_defconfig; #Breaks on compile sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/yellowstone/arch/arm*/configs/*_defconfig; #Breaks on compile sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/xiaomi/msm8937/arch/arm64/configs/*_defconfig; #Breaks on compile diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_asus_fugu.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_asus_fugu.sh deleted file mode 100644 index d6864545..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_asus_fugu.sh +++ /dev/null @@ -1,600 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/asus/fugu" -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2012-2372/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2929/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-2930/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4312/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4345/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4563/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4579/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4587/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6367/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6368/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6376/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6378/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6380/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6381/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6382/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-6885/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7026/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7266/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7339/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-7421/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0038/^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0049/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0055/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0077/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0100/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0101/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0155/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0181/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-0206/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1438/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1446/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1690/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1737/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-1738/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2039/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2309/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2523/3.10/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2568/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2672/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2673/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-2678/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3122/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3181/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3183/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3184/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3186/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3534/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3601/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3610/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3611/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3673/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3687/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3688/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3690/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-3917/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4171/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4508/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4608/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4652/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4653/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4667/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4699/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-4943/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5077/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-5471/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6410/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-6416/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7145/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7207/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7283/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7825/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7841/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7842/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7843/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7970/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-7975/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8086/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8134/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8159/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8160/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8173/3.9-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8369/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8559/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8884/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9419/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9420/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9585/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9683/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9710/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9715/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0239/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0275/^4.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1420/3.2-^3.19.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1421/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2150/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2666/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2830/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2925/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3212/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3331/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4003/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4036/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4692/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4700/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5156/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5283/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5697/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6252/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6526/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7799/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7990/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8539/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8543/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8569/3.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8812/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8955/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8962/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8967/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-9289/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-0758/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2053/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2438/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2543/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2544/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2545/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7042/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8464/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8658/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10142/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0449/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0537/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0564/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0648/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7184/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13167/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13273/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13292/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13305/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15115/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15121/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16525/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16529/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16531/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16534/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16535/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16643/3.5-^4.13.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17712/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17806/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000251/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000253/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5344/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9383/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9389/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9416/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16885/3.10/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3837/^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.0-^3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/772877_0001-usb-core-Fix-use-after-free-for-hub-usb-device.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4002/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p596" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_msm-4.9.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_msm-4.9.sh deleted file mode 100644 index 577ed29f..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_msm-4.9.sh +++ /dev/null @@ -1,390 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/msm-4.9" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0242-0243.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0286-0287.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0300-0301.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0052.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0056.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0605/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9462/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9519/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13899/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13899/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0145/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0148/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16234/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18808/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.9/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0021.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0022.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0023.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19462/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19816/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20806/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0432/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0433/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0543/4.9/0030.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-1749/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-2732/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3693/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3696/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-4788/4.9/0022.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10135/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10732/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10757/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10766/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11174/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11239/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11262/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12655/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12769/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14381/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15437/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24490/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25220/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25641/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25645/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25705/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26555/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/4.9/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29368/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29370/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36516/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-UNKNOWN/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0929/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0941/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1048/4.1-^5.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1939/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3347/4.9/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.9/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4155/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30262/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30324/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30335/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38199/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39636/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43976/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.9/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0644/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0847/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/4.9/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.9/0007.patch -editKernelLocalversion "-dos.p386" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_yellowstone.sh b/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_yellowstone.sh deleted file mode 100644 index 0602022e..00000000 --- a/Scripts/LineageOS-17.1/CVE_Patchers/android_kernel_google_yellowstone.sh +++ /dev/null @@ -1,442 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/yellowstone" -#git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.10/3.10.0098-0099.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4129/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2013-4470/^3.12/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8086/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-8480/^3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9728/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9892/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-0275/^4.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-3290/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4170/3.10-^3.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-4177/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5307/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-6937/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7513/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8215/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8539/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8551/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8746/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8767/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8785/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8944/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8970/3.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2085/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2117/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2185/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2186/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2187/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2384/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2847/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3070/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3134/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3157/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3689/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3955/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3961/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4485/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4565/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4578/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4580/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4913/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-4998/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5696/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5828/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5829/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6327/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6480/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7117/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7425/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-7913/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8405/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8466/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8633/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8650/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8658/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9083/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9178/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9555/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9576/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9588/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9604/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10208/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10318/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-partial-SMAP-bypass/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0627/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0744/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0861/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0862/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2584/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2618/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2671/^4.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5897/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5972/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5986/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/^4.9.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6345/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6346/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6353/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6951/^3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7261/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7294/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7472/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7482/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7487/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7533/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7541/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7616/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7645/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8067/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8824/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9075/^4.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9242/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9984/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11089/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11090/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11176/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11473/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11600/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12153/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-12762/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13215/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13695/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14051/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14106/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-14489/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15265/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15274/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15299/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15649/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15837/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15868/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16526/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16527/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16532/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16537/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16538/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16645/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16939/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17450/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17558/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17805/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18017/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18079/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18203/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18208/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18241/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18255/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18270/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18595/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000111/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000251/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000363/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000365/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000380/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000410/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1068/^4.16/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1130/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5333/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5750/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5803/3.10/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7492/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7757/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8781/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8822/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9514/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9518/3.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9568/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10087/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10124/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10675/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.10/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10902/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10940/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13405/3.10/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14634/3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16276/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000199/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1000204/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2001/^3.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10220/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10607/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.10/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.10/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.10/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0305/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0010.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.0-^3.10/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20261/^3.15/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20265/4.4/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/Untracked-02/ANY/797912_0001-usb-gadget-Fix-synchronization-issue-between-f_audio.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -editKernelLocalversion "-dos.p438" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-17.1/Functions.sh b/Scripts/LineageOS-17.1/Functions.sh index 34ee7e7e..a0708895 100644 --- a/Scripts/LineageOS-17.1/Functions.sh +++ b/Scripts/LineageOS-17.1/Functions.sh @@ -19,7 +19,7 @@ umask 0022; #Last verified: 2021-10-16 patchAllKernels() { - startPatcher "kernel_asus_fugu kernel_cyanogen_msm8916 kernel_google_msm-4.9 kernel_google_yellowstone kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_motorola_msm8996 kernel_oneplus_msm8994 kernel_oneplus_sm7250 kernel_oneplus_sm8150 kernel_xiaomi_sm6150 kernel_yandex_sdm660"; + startPatcher "kernel_cyanogen_msm8916 kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_motorola_msm8996 kernel_oneplus_msm8994 kernel_oneplus_sm7250 kernel_oneplus_sm8150 kernel_xiaomi_sm6150 kernel_yandex_sdm660"; } export -f patchAllKernels; @@ -74,13 +74,6 @@ buildAll() { buildDevice Amber verity; #SD765 buildDevice avicii avb; - #SD670 - buildDevice bonito avb; #18.1 not compiling - buildDevice sargo avb; - #Intel - #buildDevice fugu; #broken - #Tegra - #buildDevice yellowstone; #broken } export -f buildAll; diff --git a/Scripts/LineageOS-17.1/Patch.sh b/Scripts/LineageOS-17.1/Patch.sh index 48d3c2d8..19902895 100644 --- a/Scripts/LineageOS-17.1/Patch.sh +++ b/Scripts/LineageOS-17.1/Patch.sh @@ -420,10 +420,6 @@ if enterAndClear "device/cyanogen/msm8916-common"; then awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #broken releasetools fi; -if enterAndClear "device/google/bonito"; then -awk -i inplace '!/INODE_COUNT/' BoardConfig-lineage.mk; #mke2fs -1 incompatibility (?) -fi; - if enterAndClear "device/motorola/clark"; then echo "allow mm-qcamerad camera_prop:property_service set;" >> sepolicy/mm-qcamerad.te; echo "allow mm-qcamerad property_socket:sock_file write;" >> sepolicy/mm-qcamerad.te; @@ -480,7 +476,6 @@ removeBuildFingerprints || true; enableAutoVarInit || true; #Tweaks for <2GB RAM devices -enableLowRam "device/asus/fugu" "fugu"; enableLowRam "device/motorola/harpia" "harpia"; enableLowRam "device/motorola/merlin" "merlin"; enableLowRam "device/motorola/msm8916-common" "msm8916-common"; @@ -491,7 +486,6 @@ enableLowRam "device/cyanogen/msm8916-common" "msm8916-common"; enableLowRam "device/wileyfox/crackling" "crackling"; #Fix broken options enabled by hardenDefconfig() -sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/yellowstone/arch/arm*/configs/*_defconfig; #Breaks on compile sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/motorola/msm8996/arch/arm64/configs/*_defconfig; #Breaks on compile sed -i 's/^YYLTYPE yylloc;/extern YYLTYPE yylloc;/' kernel/*/*/scripts/dtc/dtc-lexer.l*; #Fix builds with GCC 10 diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh deleted file mode 100644 index 4fe0faf4..00000000 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_fxtec_msm8998.sh +++ /dev/null @@ -1,69 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/fxtec/msm8998" -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0011.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0013.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0015.patch -#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^5.1/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p65" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_coral.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_coral.sh deleted file mode 100644 index 187f9392..00000000 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_coral.sh +++ /dev/null @@ -1,247 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/coral" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0216-0217.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0219-0220.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0261-0262.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0263-0264.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0265-0266.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/4.14/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0057.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0058.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0059.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0060.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0061.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0062.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0063.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0064.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0065.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0066.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0067.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0068.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0069.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0070.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0071.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0072.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0073.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0074.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0075.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0076.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0077.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0078.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0079.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0080.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0081.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0082.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0083.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0084.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0085.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0086.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18232/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10520/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.14/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26555/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27170/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27171/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28374/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36322/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36516/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1968/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1969/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3348/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/^5.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/^5.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3744/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3894/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4159/^5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/^5.15/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22600/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28950/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30262/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30316/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30324/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/^5.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35105/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38198/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38199/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38300/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39711/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-41864/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42252/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43976/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44733/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0644/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0847/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch -editKernelLocalversion "-dos.p243" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_redbull.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_redbull.sh deleted file mode 100644 index 5d1e570e..00000000 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_redbull.sh +++ /dev/null @@ -1,277 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/redbull" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0181-0182.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0185-0186.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0215-0216.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0226-0227.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.19/4.19.0228-0229.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/4.19/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0087.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0088.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0089.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0090.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0091.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0092.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0094.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0097.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0098.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0099.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0100.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0101.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0102.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0103.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0104.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0105.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0106.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0107.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0108.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0109.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0110.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0111.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0112.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0113.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.19/0114.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5873/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12379/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12380/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12381/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.19/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.19/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.19/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.19/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.19/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.19/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16120/^5.7/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26555/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27830/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28374/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.19/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35519/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36311/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36322/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36516/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0938/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3348/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3506/4.18-^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.19/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3600/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.19/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.19/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/4.19/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/^5.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/^5.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.19/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3744/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3894/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4135/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4155/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4159/^5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4197/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4197/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4197/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20177/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/^5.15/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.19/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20322/4.19/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14-^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22600/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.19/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.19/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.19/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.19/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28950/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29155/4.19/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29264/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30262/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30298/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30313/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.19/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.19/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33200/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33200/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33200/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33624/4.19/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34556/4.19/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35039/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35088/qca-wifi-host-cmn/0001.patch --directory=drivers/staging/qca-wifi-host-cmn -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38198/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38199/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38300/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.19/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.19/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.19/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39698/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39698/4.19/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39698/4.19/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39698/4.19/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39698/4.19/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-41864/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42252/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43975/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43976/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44733/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-FragAttacks/^5.13/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-Misc/^5.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0644/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0847/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0886/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23041/4.19/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23041/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.19/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.19/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28389/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.19/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.19/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3444/^5.11/0001.patch -editKernelLocalversion "-dos.p273" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_sunfish.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_sunfish.sh deleted file mode 100644 index fa9179b8..00000000 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_google_sunfish.sh +++ /dev/null @@ -1,243 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/google/sunfish" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0216-0217.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0219-0220.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0261-0262.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0263-0264.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.14/4.14.0265-0266.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0002-Misc_Fixes/4.14/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/0003-syzkaller-Misc2/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0057.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0058.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0059.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0060.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0061.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0062.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0063.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0064.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0065.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0066.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0067.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0068.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0069.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0070.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0071.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0072.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0073.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0074.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0075.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0076.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0077.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0078.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0079.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0081.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0082.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0083.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0084.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0085.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.14/0086.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18232/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-25020/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3874/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9444/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10520/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11191/^5.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11487/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19602/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3702/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15780/^5.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.14/0018.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25670/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26555/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27170/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27171/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28374/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29372/^5.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29374/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29569/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36322/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36516/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-BleedingToothExtras/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0937/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1968/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1969/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3348/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3493/^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/^5.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3640/^5.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/^5.13/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3656/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3679/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3744/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3752/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3760/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.14/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3894/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4157/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4159/^5.6/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4202/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20320/^5.15/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-22600/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23134/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26931/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26932/4.14/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28038/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28039/^5.11/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28950/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28971/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29647/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30262/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30316/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30324/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31829/4.14/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33034/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34981/^5.13/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-35105/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38160/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38198/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38199/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38208/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38209/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38300/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39633/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39648/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39656/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39685/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39711/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-41864/4.14/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42252/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43976/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44733/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45485/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45486/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0644/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0847/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.14/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24959/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.14/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.14/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24586/4.14/0003.patch -editKernelLocalversion "-dos.p239" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_razer_sdm845.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_razer_sdm845.sh deleted file mode 100644 index 0ce1efe3..00000000 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_razer_sdm845.sh +++ /dev/null @@ -1,101 +0,0 @@ -#!/bin/bash -cd "$DOS_BUILD_BASE""kernel/razer/sdm845" -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0294-0295.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0295-0296.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/4.9/4.9.0300-0301.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0024.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0038.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0039.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0044.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0045.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0047.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0048.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0049.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0051.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0052.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0053.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0054.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/4.9/0055.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7477/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20855/^4.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12455/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16921/^4.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.9/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20908/^5.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0067/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3674/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24394/^5.8/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36516/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4155/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33033/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33098/^5.12/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38199/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39792/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-43976/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45469/4.9-^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.9/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0847/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.9/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23036/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24448/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25375/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/^5.17/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-GPZ2253/4.9/0007.patch -editKernelLocalversion "-dos.p97" -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh index 9654f8a9..5ebfc5b4 100644 --- a/Scripts/LineageOS-18.1/Functions.sh +++ b/Scripts/LineageOS-18.1/Functions.sh @@ -19,7 +19,7 @@ umask 0022; #Last verified: 2021-10-16 patchAllKernels() { - startPatcher "kernel_essential_msm8998 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_fxtec_msm8998 kernel_google_coral kernel_google_marlin kernel_google_msm kernel_google_msm-4.9 kernel_google_redbull kernel_google_sunfish kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_razer_sdm845 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_sony_sdm660 kernel_sony_sdm845 kernel_xiaomi_sdm660 kernel_xiaomi_sdm845 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250 kernel_zuk_msm8996"; + startPatcher "kernel_essential_msm8998 kernel_fairphone_msm8974 kernel_fairphone_sdm632 kernel_google_marlin kernel_google_msm kernel_google_msm-4.9 kernel_google_wahoo kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oneplus_msm8998 kernel_oneplus_sdm845 kernel_oneplus_sm8150 kernel_oppo_msm8974 kernel_razer_msm8998 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_sony_sdm660 kernel_sony_sdm845 kernel_xiaomi_sdm660 kernel_xiaomi_sdm845 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250 kernel_zuk_msm8996"; } export -f patchAllKernels; @@ -116,9 +116,7 @@ buildAll() { buildDevice taimen avb; buildDevice walleye avb; #SD845 - buildDevice aura avb; buildDevice beryllium avb; - buildDevice pro1 avb; buildDevice crosshatch avb; buildDevice blueline avb; buildDevice enchilada avb; #XXX: uses stock /vendor @@ -128,26 +126,16 @@ buildAll() { buildDevice xz2c avb; #SD632 buildDevice FP3 avb; - #SD730 - buildDevice sunfish avb; #SD855 buildDevice guacamole avb; buildDevice hotdog avb; buildDevice hotdogb avb; - buildDevice coral avb; - buildDevice flame avb; #buildDevice raphael avb; #unb + missing vendor buildDevice vayu avb; #needs init.qcom.sensors.sh - #SD765 - buildDevice bramble avb; - buildDevice redfin avb; #SD865 buildDevice lmi avb; #SD870 buildDevice alioth avb; - #SD670 - buildDevice bonito avb; #error: ln: cannot create symbolic link from '/data/vendor/rfs/mpss' to 'out/target/product/bonito/vendor/rfs/msm/mpss//readwrite': - #buildDevice sargo avb; } export -f buildAll; diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh index 3f13f6cb..32665f0e 100644 --- a/Scripts/LineageOS-18.1/Patch.sh +++ b/Scripts/LineageOS-18.1/Patch.sh @@ -447,18 +447,10 @@ if enterAndClear "device/essential/mata"; then echo "allow permissioncontroller_app tethering_service:service_manager find;" > sepolicy/private/permissioncontroller_app.te; fi; -if enterAndClear "device/google/bonito"; then -awk -i inplace '!/INODE_COUNT/' BoardConfigLineage.mk; #mke2fs -1 incompatibility (?) -fi; - if enterAndClear "device/google/marlin"; then sed -i 's/BTLogSave \\/BTLogSave/' common/base.mk; #deblobber fixup fi; -if enterAndClear "device/google/redbull"; then -awk -i inplace '!/sctp/' BoardConfig-common.mk modules.load; #fix compile after hardenDefconfig -fi; - if enterAndClear "device/htc/m8-common"; then awk -i inplace '!/TARGET_RELEASETOOLS_EXTENSIONS/' BoardConfigCommon.mk; #broken releasetools fi; diff --git a/Scripts/LineageOS-19.1/Patch.sh b/Scripts/LineageOS-19.1/Patch.sh index 050c7fb3..c8faeb8f 100644 --- a/Scripts/LineageOS-19.1/Patch.sh +++ b/Scripts/LineageOS-19.1/Patch.sh @@ -381,6 +381,7 @@ if [ "$DOS_MICROG_INCLUDED" = "NLP" ]; then echo "PRODUCT_PACKAGES += UnifiedNLP echo "PRODUCT_PACKAGES += eSpeakNG" >> packages.mk; #PicoTTS needs work to compile on 18.1, use eSpeak-NG instead awk -i inplace '!/speed-profile/' build/target/product/lowram.mk; #breaks compile on some dexpreopt devices sed -i 's/wifi,cell/internet/' overlay/common/frameworks/base/packages/SystemUI/res/values/config.xml; #Use the modern quick tile +sed -i 's|system/etc|$(TARGET_COPY_OUT_PRODUCT)/etc|' divested.mk; fi; # #END OF ROM CHANGES @@ -389,10 +390,6 @@ fi; # #START OF DEVICE CHANGES # -#if enterAndClear "device/google/bonito"; then -#awk -i inplace '!/INODE_COUNT/' BoardConfigLineage.mk; #mke2fs -1 incompatibility (?) #XXX 19REBASE: still needed? -#fi; - if enterAndClear "device/google/redbull"; then awk -i inplace '!/sctp/' BoardConfig-common.mk modules.load; #fix compile after hardenDefconfig fi;