diff --git a/Manifests/Manifest_LAOS-15.1.xml b/Manifests/Manifest_LAOS-15.1.xml index 82721797..296a12b6 100644 --- a/Manifests/Manifest_LAOS-15.1.xml +++ b/Manifests/Manifest_LAOS-15.1.xml @@ -98,14 +98,6 @@ - - - - - - - - @@ -116,6 +108,7 @@ + diff --git a/Manifests/Manifest_LAOS-18.1.xml b/Manifests/Manifest_LAOS-18.1.xml index f14bd620..9252ceef 100644 --- a/Manifests/Manifest_LAOS-18.1.xml +++ b/Manifests/Manifest_LAOS-18.1.xml @@ -114,6 +114,8 @@ + + @@ -124,26 +126,6 @@ - - - - - - - - - - - - - - - - - - - - diff --git a/Manifests/Manifest_LAOS-19.1.xml b/Manifests/Manifest_LAOS-19.1.xml index 1d0e3c9b..da197099 100644 --- a/Manifests/Manifest_LAOS-19.1.xml +++ b/Manifests/Manifest_LAOS-19.1.xml @@ -11,6 +11,7 @@ + @@ -59,8 +60,35 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -98,7 +126,7 @@ - + diff --git a/Manifests/Manifest_LAOS-20.0.xml b/Manifests/Manifest_LAOS-20.0.xml index 01e99e8e..347b96ab 100644 --- a/Manifests/Manifest_LAOS-20.0.xml +++ b/Manifests/Manifest_LAOS-20.0.xml @@ -11,6 +11,8 @@ + + diff --git a/Patches/LineageOS-19.1/android_system_sepolicy/0001-LGE_Fixes.patch b/Patches/LineageOS-19.1/android_system_sepolicy/0001-LGE_Fixes.patch new file mode 100644 index 00000000..f353c872 --- /dev/null +++ b/Patches/LineageOS-19.1/android_system_sepolicy/0001-LGE_Fixes.patch @@ -0,0 +1,35 @@ +From acf37ef4f2f187641d1f0a8bd5a313ee46135ef9 Mon Sep 17 00:00:00 2001 +From: Tad +Date: Tue, 14 Apr 2020 17:16:42 -0400 +Subject: [PATCH] Fix -user builds for many LGE devices + +Change-Id: I3649cf211a356c57e129fbda1f5184a4bebc85af +--- + public/domain.te | 4 ++++ + 1 file changed, 4 insertions(+) + +diff --git a/public/domain.te b/public/domain.te +index 6f3a19cd..87ca0e6c 100644 +--- a/public/domain.te ++++ b/public/domain.te +@@ -597,6 +597,9 @@ neverallow { + -update_engine + } system_block_device:blk_file { write append }; + ++# Select devices have policies prevented by the following neverallow ++attribute misc_block_device_exception; ++ + # No domains other than a select few can access the misc_block_device. This + # block device is reserved for OTA use. + # Do not assert this rule on userdebug/eng builds, due to some devices using +@@ -614,6 +617,7 @@ neverallow { + -vold + -recovery + -ueventd ++ -misc_block_device_exception + } misc_block_device:blk_file { append link relabelfrom rename write open read ioctl lock }; + + # Only (hw|vnd|)servicemanager should be able to register with binder as the context manager +-- +2.26.0 + diff --git a/Scripts/Common/Fix_CVE_Patchers.sh b/Scripts/Common/Fix_CVE_Patchers.sh index b9e5f40f..ca4112f5 100644 --- a/Scripts/Common/Fix_CVE_Patchers.sh +++ b/Scripts/Common/Fix_CVE_Patchers.sh @@ -68,7 +68,7 @@ commentPatches android_kernel_htc_msm8974.sh "CVE-2016-8393" "CVE-2022-22058"; commentPatches android_kernel_htc_msm8994.sh "CVE-2016-8394/ANY/0001.patch" "CVE-2017-13166" "CVE-2018-3585" "CVE-2018-9514"; commentPatches android_kernel_lge_bullhead.sh "CVE-2014-8559"; commentPatches android_kernel_lge_msm8992.sh "CVE-2018-5897" "CVE-2018-11266"; -commentPatches android_kernel_lge_msm8996.sh "CVE-2016-6198" "CVE-2017-13162/3.18/0001.patch" "CVE-2017-15951" "CVE-2018-17972" "CVE-2019-2214" "CVE-2019-14070/ANY/0006.patch" "CVE-2019-16746" "CVE-2020-0427" "CVE-2020-14381" "CVE-2020-16166" "CVE-2022-42896/4.9"; +commentPatches android_kernel_lge_msm8996.sh "0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch"; commentPatches android_kernel_moto_shamu.sh "CVE-2014-8559"; commentPatches android_kernel_motorola_msm8916.sh "0001-LinuxIncrementals/3.10/3.10.0050-0051.patch" "CVE-2014-8559" "CVE-2017-15817" "CVE-2018-9514"; commentPatches android_kernel_motorola_msm8974.sh "CVE-2016-5696" "CVE-2017-7373" "CVE-2017-17770/3.4/0002.patch" "CVE-2019-11599" "CVE-2022-22058"; @@ -125,13 +125,13 @@ do commentPatches $script "CVE-2016-1583/3.18" "CVE-2018-17972/3.18" "CVE-2018-20169/3.18" "CVE-2019-2214/3.18" "CVE-2020-0427/3.18" "CVE-2021-21781/3.18" "CVE-2022-40768/4.4"; done #3.18 -declare -a threeDotEighteen=("${threeDotTen[@]}" "android_kernel_samsung_universal8890.sh" "android_kernel_google_dragon.sh" "android_kernel_lge_msm8996.sh" "android_kernel_zte_msm8996.sh" "android_kernel_asus_msm8953.sh" "android_kernel_google_marlin.sh" "android_kernel_motorola_msm8996.sh" "android_kernel_oneplus_msm8996.sh"); +declare -a threeDotEighteen=("${threeDotTen[@]}" "android_kernel_samsung_universal8890.sh" "android_kernel_google_dragon.sh" "android_kernel_zte_msm8996.sh" "android_kernel_asus_msm8953.sh" "android_kernel_google_marlin.sh" "android_kernel_motorola_msm8996.sh" "android_kernel_oneplus_msm8996.sh"); for script in "${threeDotEighteen[@]}" do commentPatches $script "0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch" "CVE-2018-16597/4.4" "CVE-2019-19319/4.4" "CVE-2020-0305/4.4" "CVE-2020-0429/4.4" "CVE-2020-8992/4.4" "CVE-2021-1048/4.4" "CVE-2021-3428/4.4" "CVE-2021-20265/4.4" "CVE-2022-1184/4.9/0007.patch" "CVE-2022-40768/4.9/0007.patch" "CVE-2022-40768/4.4/0008.patch" "CVE-2022-47929/4.4" "CVE-2023-0458"; done #4.4 -declare -a fourDotFour=("${threeDotEighteen[@]}" "android_kernel_essential_msm8998.sh" "android_kernel_fxtec_msm8998.sh" "android_kernel_zuk_msm8996.sh" "android_kernel_xiaomi_sdm660.sh" "android_kernel_sony_sdm660.sh" "android_kernel_razer_msm8998.sh" "android_kernel_oneplus_msm8998.sh" "android_kernel_google_wahoo.sh" "android_kernel_yandex_sdm660.sh" "android_kernel_zuk_msm8996.sh"); +declare -a fourDotFour=("${threeDotEighteen[@]}" "android_kernel_essential_msm8998.sh" "android_kernel_fxtec_msm8998.sh" "android_kernel_lge_msm8996.sh" "android_kernel_zuk_msm8996.sh" "android_kernel_xiaomi_sdm660.sh" "android_kernel_sony_sdm660.sh" "android_kernel_razer_msm8998.sh" "android_kernel_oneplus_msm8998.sh" "android_kernel_google_wahoo.sh" "android_kernel_yandex_sdm660.sh" "android_kernel_zuk_msm8996.sh"); for script in "${fourDotFour[@]}" do commentPatches $script "CVE-2023-2513"; diff --git a/Scripts/Common/Functions.sh b/Scripts/Common/Functions.sh index 97cb6858..220ff186 100644 --- a/Scripts/Common/Functions.sh +++ b/Scripts/Common/Functions.sh @@ -514,7 +514,8 @@ export -f hardenLocationSerials; hardenLocationConf() { local gpsConfig=$1; #Debugging: adb logcat -b all | grep -i -e locsvc -e izat -e gps -e gnss -e location -e xtra - #sed -i 's|DEBUG_LEVEL = .|DEBUG_LEVEL = 4|' "$gpsConfig" &> /dev/null || true; + #sed -i 's|DEBUG_LEVEL = .|DEBUG_LEVEL = 4|' "$gpsConfig" &> /dev/null || true; #Debug + #sed -i 's|DEBUG_LEVEL = .|DEBUG_LEVEL = 2|' "$gpsConfig" &> /dev/null || true; #Warning #Enable GLONASS if [ "$DOS_GPS_GLONASS_FORCED" = true ]; then sed -i 's/#A_GLONASS_POS_PROTOCOL_SELECT =/A_GLONASS_POS_PROTOCOL_SELECT =/' "$gpsConfig" &>/dev/null || true; diff --git a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8996.sh deleted file mode 100644 index 048629c5..00000000 --- a/Scripts/LineageOS-15.1/CVE_Patchers/android_kernel_lge_msm8996.sh +++ /dev/null @@ -1,624 +0,0 @@ -#!/bin/bash -if cd "$DOS_BUILD_BASE""kernel/lge/msm8996"; then -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0115-0116.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.18/0002-Alt2.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0024-other2.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-canaries/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5967/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9704/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9708/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10810/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11045/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11077/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13162/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15814/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15846/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15851/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15857/^3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18306/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6554/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6555/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9463/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11960/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-1999/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2000/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2000/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2025/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2287/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2290/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10486/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10494/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^3.18/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/3.18/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25045/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0066/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0255/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/3.18/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36557/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0920/3.18/0008-backport.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.4/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20265/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2248/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p618" -else echo "kernel_lge_msm8996 is unavailable, not patching."; -fi; -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-15.1/Functions.sh b/Scripts/LineageOS-15.1/Functions.sh index 0139637f..65268e9e 100644 --- a/Scripts/LineageOS-15.1/Functions.sh +++ b/Scripts/LineageOS-15.1/Functions.sh @@ -19,7 +19,7 @@ umask 0022; #Last verified: 2021-10-16 patchAllKernels() { - startPatcher "kernel_asus_fugu kernel_asus_msm8916 kernel_google_dragon kernel_google_msm kernel_htc_flounder kernel_huawei_angler kernel_lge_bullhead kernel_lge_hammerhead kernel_lge_msm8996 kernel_moto_shamu kernel_nextbit_msm8992 kernel_zte_msm8996"; + startPatcher "kernel_asus_fugu kernel_asus_msm8916 kernel_google_dragon kernel_google_msm kernel_htc_flounder kernel_huawei_angler kernel_lge_bullhead kernel_lge_hammerhead kernel_moto_shamu kernel_nextbit_msm8992 kernel_zte_msm8996"; } export -f patchAllKernels; @@ -67,8 +67,6 @@ buildAll() { buildDevice Z00T; #SD820 buildDevice axon7; - buildDevice h870; - buildDevice us997; #Intel buildDevice fugu; #Tegra diff --git a/Scripts/LineageOS-15.1/Patch.sh b/Scripts/LineageOS-15.1/Patch.sh index 8edb3d5f..aac5a9df 100644 --- a/Scripts/LineageOS-15.1/Patch.sh +++ b/Scripts/LineageOS-15.1/Patch.sh @@ -486,10 +486,6 @@ if enterAndClear "device/asus/msm8916-common"; then rm -rf Android.bp sensors; #exact duplicate in asus/flo #XXX be careful with this fi; -if enterAndClear "device/lge/msm8996-common"; then -sed -i '3itypeattribute hwaddrs misc_block_device_exception;' sepolicy/hwaddrs.te; -fi; - #if enterAndClear "device/moto/shamu"; then #git revert --no-edit 05fb49518049440f90423341ff25d4f75f10bc0c; #restore releasetools #TODO #fi; @@ -524,7 +520,6 @@ enableLowRam "device/asus/fugu"; #Fix broken options enabled by hardenDefconfig() [[ -d kernel/google/msm ]] && sed -i "s/CONFIG_DEBUG_RODATA=y/# CONFIG_DEBUG_RODATA is not set/" kernel/google/msm/arch/arm/configs/lineageos_*_defconfig; #Breaks on compile -[[ -d kernel/lge/msm8996 ]] && sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/lge/msm8996/arch/arm64/configs/lineageos_*_defconfig; #Breaks on compile [[ -d kernel/zte/msm8996 ]] && sed -i "s/CONFIG_STRICT_MEMORY_RWX=y/# CONFIG_STRICT_MEMORY_RWX is not set/" kernel/zte/msm8996/arch/arm64/configs/lineageos_*_defconfig; #Breaks on compile sed -i 's/^YYLTYPE yylloc;/extern YYLTYPE yylloc;/' kernel/*/*/scripts/dtc/dtc-lexer.l* || true; #Fix builds with GCC 10 diff --git a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8996.sh deleted file mode 100644 index 062458f9..00000000 --- a/Scripts/LineageOS-18.1/CVE_Patchers/android_kernel_lge_msm8996.sh +++ /dev/null @@ -1,615 +0,0 @@ -#!/bin/bash -if cd "$DOS_BUILD_BASE""kernel/lge/msm8996"; then -git apply $DOS_PATCHES_LINUX_CVES/0001-LinuxIncrementals/3.18/3.18.0115-0116.patch --exclude=Makefile -git apply $DOS_PATCHES_LINUX_CVES/0005-AndroidHardening-Deny_USB/3.18/0002-Alt2.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0022.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0023.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0024-other2.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0025.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0026.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0028.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0029.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0030.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0032.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0033.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0034.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0035.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0036.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0037.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0040.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0041.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0042.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0043.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0046.patch -git apply $DOS_PATCHES_LINUX_CVES/0006-AndroidHardening-Kernel_Hardening/3.18/0050.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-canaries/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch -git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch -git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/0090-Unknown/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2014-9900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-1339/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2041/^3.19/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-2042/^3.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-5257/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7515/^4.3/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7566/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7833/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7884/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7885/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8104/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8553/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8709/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8844/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8845/^4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-8953/^4.2/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2069/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2184/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2549/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2550/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-2782/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3136/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3137/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3138/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3140/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-3857/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-5244/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6130/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.7/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6197/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6198/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6672/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8630/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8646/^4.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-9756/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10741/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10906/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-GadgetFS/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-2583/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5549/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5551/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5669/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-5967/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6001/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-6348/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7273/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-7518/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8068/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8069/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8924/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-8925/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10810/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-10911/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-11031/3.18/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13162/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13168/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13220/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13246/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15102/4.4/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-15951/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16536/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16644/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16650/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16994/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16995/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17741/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18216/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18360/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18509/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18551/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000370/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-1066/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5390/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5832/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5849/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5904/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5953/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6554/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-6555/4.9/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-7755/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8043/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-8087/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9363/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9422/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9463/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9465/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9516/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10323/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10876/3.18/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10877/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10878/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10879/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10880/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10881/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10882/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10883/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-10938/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11506/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11832/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11939/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11960/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11984/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11986/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11987/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-11988/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12232/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12233/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-12896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13053/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13094/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13406/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13900/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13912/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13913/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13914/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-13919/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14612/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14633/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-14734/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-15594/3.18/0005.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16658/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16862/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16884/3.18/0003.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-17972/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18021/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18690/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-18710/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19824/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-19985/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20169/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20511/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20836/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-20856/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-21008/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-v4l2-event-uaf/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0146/4.4/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-0154/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0013.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2054/ANY/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2101/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2213/3.18/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2214/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2215/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2287/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2323/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2331/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2333/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2341/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-2345/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3459/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3460/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3701/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3846/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-3882/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6133/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-6974/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7221/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-7222/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9213/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9245/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9453/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-9506/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10142/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10486/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10491/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10503/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10515/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10524/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10527/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10529/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10544/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10555/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10567/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10571/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10622/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-10638/^3.18/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11190/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11477/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11478/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11479/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11486/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11810/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11833/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-11884/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12614/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12818/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12819/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12881/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13631/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-13648/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14037/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14038/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14039/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14040/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14041/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14047/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14053/ANY/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14055/ANY/0001.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14070/ANY/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14284/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14615/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14814/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14821/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14835/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14895/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14896/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14901/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15098/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15117/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15118/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15211/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15212/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15213/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15214/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15215/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15216/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15217/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15218/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15219/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15220/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15292/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15505/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15807/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15916/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15926/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15927/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16232/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16233/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16413/3.18/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16746/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16995/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17052/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17053/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17054/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17055/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17075/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17133/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-17666/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18683/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-18806/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/^5.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19052/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19054/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19056/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19057/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19060/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19061/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19062/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19063/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19066/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19073/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19074/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19227/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19318/3.18/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0017.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0018.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0019.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19319/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19332/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19447/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19448/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19524/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19527/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.3/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19528/^5.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19530/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19531/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19532/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19533/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19534/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19536/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19537/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19813/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19815/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19947/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19965/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19966/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20054/3.18/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20096/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20636/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20810/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-20812/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-25045/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0009/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0030/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0066/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0404/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0423/3.18/0006.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0427/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0429/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0431/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0444/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0465/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-3625/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8647/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8648/3.18/0012.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8694/3.18/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-8992/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-9383/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10711/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10720/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10769/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10773/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-10942/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11160/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11234/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11261/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11267/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11282/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11286/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11309/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11494/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11565/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11608/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11609/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-11668/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/3.6-^5.10/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12352/ANY/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12652/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12653/4.4/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12654/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12656/4.4/0009.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12770/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12771/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-12826/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13143/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-13974/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14305/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14314/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14331/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14351/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14390/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14416/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15393/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-15436/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16166/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.4/0019.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-24588/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25211/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25212/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25284/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25285/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25643/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25668/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25669/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25671/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25672/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-25673/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26088/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26139/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-26147/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27066/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27068/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27815/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-27825/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28097/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28915/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-28974/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29371/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29568/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29661/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-35508/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36158/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36312/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-36557/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0399/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0512/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0605/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0695/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0920/3.18/0008-backport.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0936/ANY/0005.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0961/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-1963/ANY/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3178/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3428/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3483/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3564/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3573/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3609/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3612/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3653/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.4/0011.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0014.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3655/4.9/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3659/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3715/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3732/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3753/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0020.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3772/4.4/0021.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-3896/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4002/4.4/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20265/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20321/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-21781/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-23133/3.18/0017.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-26930/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27363/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-27365/3.18/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28660/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28688/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28713/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28715/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28964/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-28972/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29154/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-29650/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-30002/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-31916/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-32399/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33909/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-34693/3.18/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37576/4.4/0006.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38204/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-38205/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39634/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39657/3.18/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39714/4.4/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-39715/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-40490/3.9-^5.14/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42008/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45095/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-45868/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0330/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0617/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0850/3.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20141/4.4/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20399/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20422/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0015.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-24958/4.4/0016.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25258/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.9/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch -#git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2248/4.4/0008.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14283/3.18/0004.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-0466/3.18/0003.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-29660/3.18/0007.patch -git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-37159/4.4/0006.patch -editKernelLocalversion "-dos.p609" -else echo "kernel_lge_msm8996 is unavailable, not patching."; -fi; -cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-18.1/Functions.sh b/Scripts/LineageOS-18.1/Functions.sh index ec3645f0..a8294472 100644 --- a/Scripts/LineageOS-18.1/Functions.sh +++ b/Scripts/LineageOS-18.1/Functions.sh @@ -19,7 +19,7 @@ umask 0022; #Last verified: 2021-10-16 patchAllKernels() { - startPatcher "kernel_fairphone_msm8974 kernel_google_marlin kernel_google_msm kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_lge_msm8996 kernel_moto_shamu kernel_motorola_msm8974 kernel_motorola_msm8996 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oppo_msm8974 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm660 kernel_xiaomi_sdm845 kernel_zuk_msm8996"; + startPatcher "kernel_fairphone_msm8974 kernel_google_marlin kernel_google_msm kernel_htc_msm8974 kernel_lge_g3 kernel_lge_mako kernel_lge_msm8974 kernel_moto_shamu kernel_motorola_msm8974 kernel_motorola_msm8996 kernel_nextbit_msm8992 kernel_oneplus_msm8996 kernel_oppo_msm8974 kernel_samsung_jf kernel_samsung_msm8930-common kernel_samsung_msm8974 kernel_xiaomi_sdm660 kernel_xiaomi_sdm845 kernel_zuk_msm8996"; } export -f patchAllKernels; @@ -92,15 +92,6 @@ buildAll() { buildDevice ether; #SD820 buildDevice griffin; - buildDevice h830; - buildDevice h850; - buildDevice rs988; - buildDevice h910; - buildDevice h918; - buildDevice h990; - buildDevice ls997; - buildDevice us996; - buildDevice vs995; buildDevice oneplus3 verity; #needs manual patching - broken yyloc buildDevice z2_plus verity; #broken #SD821 diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh index 31df1e6e..65d143f4 100644 --- a/Scripts/LineageOS-18.1/Patch.sh +++ b/Scripts/LineageOS-18.1/Patch.sh @@ -494,14 +494,6 @@ sed -i '16iifeq ($(TARGET_DEVICE),mako)' sensors/Android.mk; echo "endif" >> sensors/Android.mk; fi; -if enterAndClear "device/lge/msm8996-common"; then -sed -i '3itypeattribute hwaddrs misc_block_device_exception;' sepolicy/hwaddrs.te; -echo "allow hwaddrs self:capability { fowner };" >> sepolicy/hwaddrs.te; -echo "allow hwaddrs block_device:lnk_file { open };" >> sepolicy/hwaddrs.te; -awk -i inplace '!/WfdCommon/' msm8996.mk; #fix breakage -echo "type sensors_data_file, file_type, data_file_type, core_data_file_type;" >> sepolicy/file.te; #only included in -userdebug -fi; - if enterAndClear "device/moto/shamu"; then git revert --no-edit 0ba2cb240e8483fa85fcc831328f70f65eeb7180 2be3c88c331387f03978b75ebc118e09738216d0 ff98fee8fc40d00e1c8b296fd4bb20077bc056d6; #breakage #git revert --no-edit 05fb49518049440f90423341ff25d4f75f10bc0c; #restore releasetools #TODO diff --git a/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_lge_msm8996.sh b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_lge_msm8996.sh new file mode 100644 index 00000000..ae4a2890 --- /dev/null +++ b/Scripts/LineageOS-19.1/CVE_Patchers/android_kernel_lge_msm8996.sh @@ -0,0 +1,164 @@ +#!/bin/bash +if cd "$DOS_BUILD_BASE""kernel/lge/msm8996"; then +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0015.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-allocsize/4.9/0020.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.4/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-bugon/4.4/0008.patch +#git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-canaries/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-misc/4.4/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-random/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0027.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-ro/4.9/0031.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slab/4.4/0016.patch +git apply $DOS_PATCHES_LINUX_CVES/0008-Graphene-Kernel_Hardening-slub/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/0009-rfc4941bis/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2015-7837/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-1583/^4.6/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-6187/^4.7/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-8394/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2016-10153/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-16USB/ANY/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-0610/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9059/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-9211/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13218/4.4/0019.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13693/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-13694/^4.12.9/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-17052/4.9/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18174/^4.10/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-18204/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2017-1000252/^4.13/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-5897/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9415/ANY/0005.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-9463/ANY/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2018-16597/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-8912/^5.0/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12378/^5.1.5/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-12456/^5.1.5/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-14763/^5.1/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-15291/4.4/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-16994/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19051/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2019-19068/4.4/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-14386/3.10-^4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2020-16119/^5.10/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-0935/4.9/0006.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4034/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-4149/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-20292/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-33656/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-42739/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2021-44879/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0435/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0487/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0492/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-0494/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1011/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1016/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1184/4.9/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1198/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1199/4.9/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1353/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1516/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1652/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1679/^5.19/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1729/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1734/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1836/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1974/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-1975/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2153/^5.17/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2318/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2380/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2588/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2639/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.4/0011.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2663/4.4/0012.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2964/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-2978/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3028/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3061/^5.18/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3111/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3202/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3424/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3524/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3542/3.8-^6.0/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3565/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3594/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3621/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3628/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3629/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3635/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3646/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-3649/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4378/4.9/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-4662/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20148/^5.15/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-20368/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23037/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23039/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23040/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-23042/4.9/0003.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-25677/ANY/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-26966/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27223/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-27950/^5.16/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28356/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-28390/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-30594/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-32981/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33740/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-33744/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36123/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36280/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36879/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-36946/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39188/4.4/0010.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-39842/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-40768/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41849/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41850/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-41858/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42328/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42703/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42895/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896/4.4/0009.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-42896-extra/4.4/0002.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-43750/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-45934/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-47929/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2022-Misc/ANY/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0045/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0047/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0394/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0458/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-0615/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1073/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1074/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1095/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1118/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1513/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1637/4.9/0004.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1670/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1989/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-1990/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2162/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2194/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-2248/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23454/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23455/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-23559/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-26545/4.4/0007.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-28328/4.4/0001.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-30772/4.4/0008.patch +git apply $DOS_PATCHES_LINUX_CVES/CVE-2023-32269/4.4/0001.patch +editKernelLocalversion "-dos.p158" +else echo "kernel_lge_msm8996 is unavailable, not patching."; +fi; +cd "$DOS_BUILD_BASE" diff --git a/Scripts/LineageOS-19.1/Functions.sh b/Scripts/LineageOS-19.1/Functions.sh index d2fabc6b..eeb94c14 100644 --- a/Scripts/LineageOS-19.1/Functions.sh +++ b/Scripts/LineageOS-19.1/Functions.sh @@ -19,7 +19,7 @@ umask 0022; #Last verified: 2022-04-04 patchAllKernels() { - startPatcher "kernel_sony_sdm660 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250"; + startPatcher "kernel_lge_msm8996 kernel_sony_sdm660 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250"; } export -f patchAllKernels; @@ -58,6 +58,18 @@ buildAll() { buildDevice discovery; buildDevice kirin; buildDevice mermaid; + #SD820 + buildDevice h830; + buildDevice h850; + buildDevice rs988; + buildDevice h870; + buildDevice us997; + buildDevice h910; + buildDevice h918; + buildDevice h990; + buildDevice ls997; + buildDevice us996; + buildDevice vs995; #SD855 buildDevice vayu avb; #SD865 diff --git a/Scripts/LineageOS-19.1/Patch.sh b/Scripts/LineageOS-19.1/Patch.sh index 41aa7ac0..9188181a 100644 --- a/Scripts/LineageOS-19.1/Patch.sh +++ b/Scripts/LineageOS-19.1/Patch.sh @@ -221,6 +221,10 @@ if enterAndClear "hardware/qcom-caf/msm8953/audio"; then applyPatch "$DOS_PATCHES/android_hardware_qcom_audio/0001-Unused-8998.patch"; #audio_extn: Fix unused parameter warning in utils.c (codeworkx) fi; +if enterAndClear "hardware/qcom-caf/msm8996/audio"; then +applyPatch "$DOS_PATCHES/android_hardware_qcom_audio/0001-Unused-8996.patch"; #audio_extn: Fix unused parameter warning in utils.c (codeworkx) +fi; + if enterAndClear "hardware/qcom-caf/msm8998/audio"; then applyPatch "$DOS_PATCHES/android_hardware_qcom_audio/0001-Unused-8998.patch"; #audio_extn: Fix unused parameter warning in utils.c (codeworkx) fi; @@ -394,6 +398,15 @@ if enterAndClear "system/sepolicy"; then applyPatch "$DOS_PATCHES/android_system_sepolicy/0002-protected_files.patch"; #Label protected_{fifos,regular} as proc_security (GrapheneOS) applyPatch "$DOS_PATCHES/android_system_sepolicy/0003-ptrace_scope-1.patch"; #Allow init to control kernel.yama.ptrace_scope (GrapheneOS) applyPatch "$DOS_PATCHES/android_system_sepolicy/0003-ptrace_scope-2.patch"; #Allow system to use persist.native_debug (GrapheneOS) +git am "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch"; #Fix -user builds for LGE devices (DivestOS) +patch -p1 < "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch" --directory="prebuilts/api/32.0"; +patch -p1 < "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch" --directory="prebuilts/api/31.0"; +patch -p1 < "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch" --directory="prebuilts/api/30.0"; +patch -p1 < "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch" --directory="prebuilts/api/29.0"; +patch -p1 < "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch" --directory="prebuilts/api/28.0"; +patch -p1 < "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch" --directory="prebuilts/api/27.0"; +patch -p1 < "$DOS_PATCHES/android_system_sepolicy/0001-LGE_Fixes.patch" --directory="prebuilts/api/26.0"; +awk -i inplace '!/true cannot be used in user builds/' Android.mk; #Allow ignoring neverallows under -user awk -i inplace '!/domain=gmscore_app/' private/seapp_contexts prebuilts/api/*/private/seapp_contexts; #Disable unused gmscore_app domain (GrapheneOS) fi; @@ -434,6 +447,16 @@ fi; # #START OF DEVICE CHANGES # +if enterAndClear "device/lge/msm8996-common"; then +sed -i '3itypeattribute hwaddrs misc_block_device_exception;' sepolicy/hwaddrs.te; +echo "allow hwaddrs block_device:lnk_file { open };" >> sepolicy/hwaddrs.te; +echo "type sensors_data_file, file_type, data_file_type, core_data_file_type;" >> sepolicy/file.te; #only included in -userdebug +fi; + +if enterAndClear "device/lge/h830"; then +sed -i 's|binvendor|bin:vendor|' proprietary-files.txt; #fix typo +fi; + #Make changes to all devices cd "$DOS_BUILD_BASE"; find "hardware/qcom/gps" -name "gps\.conf" -type f -print0 | xargs -0 -n 1 -P 4 -I {} bash -c 'hardenLocationConf "{}"';